Cookies

Notice: This website may or may not use or set cookies used by Google Ad-sense or other third party companies. If you do not wish to have cookies downloaded to your computer, please disable cookie use in your browser. Thank You.

Tuesday, September 22, 2015

Big Brother Surveillance Threat, Part 3: Anti-Surveillance Guide

Big Brother Surveillance Threat, Part 3: Anti-Surveillance Guide


This is Part Three, of a series that Urban Survival Skills is calling "Big Brother Surveillance Threat" and is publishing, that are excerpts from a huge article titled "You Are a Criminal In a Mass Surveillance World – Here’s How Not To Get Caught", but David Montgomery and posted on Prepared Gun Owners.com
[http://preparedgunowners.com/2015/06/11/you-are-a-criminal-in-a-mass-surveillance-world-heres-how-not-to-get-caught/]

ANTI-SURVEILLANCE GUIDE

The following guide is 10 basic steps which involve using free software. It’s followed by a list of essential security practices. The guide is intended to be a “minimum effective dose” of security against hackers, fraudsters and mass surveillance. It may seem like a lot, but if anything I went light because I don’t want people to get overwhelmed and do nothing. This is an incremental process. If one of these steps is too difficult or intimidating, don’t bail on everything else. Every step substantially decreases your risk exposure.

Good security is a habit more than anything. What may initially seem like an inconvenience will eventually not even be noticed, just like locking the door to your home. Suggestions for improvements and updates are welcome and appreciated.

STEP 1 – CLEAN AND PREP

Why: There’s a good chance your computer is already infected with malicious software (malware). Unfortunately malware attacks are a never-ending plague. You can’t spend time online and not be at risk of infection. This includes viruses, key loggers (which secretly record everything you type, like GROK or Magic Lantern) and various other programs that track you and send your private information to bad guys.

There are thousands and thousands of malware programs out there with new ones being launched daily. It’s not just hackers, fraudsters, or governments who create and spread malware. Huge companies that you’d think would be fiercely protective of their reputation, like Sony, will infect you. Lenovo, the world’s largest personal computer vendor, is under fire for selling 43 models with pre-installed malware which dramatically undermines your computer’s security. This site shows if you’re infected. If you are, here’s how to fix it.

***For Apple desktops and laptops only***

Install and run the following programs:

CCleaner – Download the free version. After you’ve run a scan and fixed any problems it finds, close it and then move onto the next program. I suggest running CCleaner once per month.

Sophos Anti-Virus Home Edition – This program is free. Install and run a scan to make sure you’re clean. Macs are much less virus prone than Windows PCs, but infections are still possible. I recommend this program because phishing attacks keep getting more and more sophisticated, and it’s pretty easy these days to be tricked into clicking malicious web site links and opening malicious files. If you already have another anti-virus program installed, update and run it instead.

***For Windows PCs and laptops only***

First, let’s make sure your copy of Windows is up to date. Microsoft is constantly releasing security patches to fix security vulnerabilities, and your computer should be set to automatically install important updates. If you don’t know how to check if important updates have been installed, see this if you’re running Windows 7 and this if you’re running Windows 8. Windows 10 installs updates automatically.

Second, see if your anti-virus scanner is up to date and then run a scan. Both Windows 7 and Windows 8 come with free anti-virus software. If you already run a third party anti-virus program, update and run that instead. If you haven’t installed any third party anti-virus software, on Windows 7 load Microsoft Security Essentials and do a scan. If you don’t have it, install it free here (ignore this if you run Windows 8). For Windows 8, run a scan with Windows Defender (see here if you need help). Don’t continue until the scan is finished. Virus scans take a while (10-20 minutes), so it’s a good time to grab a drink or a snack. If you find any infections, quarantine or delete them.

Third, we’re going to install and run four free programs that protect against malware. They all work a bit differently and catch different infections. If you already have other anti-malware programs you use, you can decide whether to delete them and go with this suite or stick with what you have.

Reboot your machine if it’s been on a long time. (A fresh restart is generally a good idea when installing a bunch of new software.) Then install and run the following:

CCleaner – Get the free version. Make a backup of your registry when it asks. After you’ve run a scan and fixed any problems it finds, close it and then move to the next program.

Malwarebytes Anti-Malware – Get the free version. Check for updates before running the scan. Fix any problems it finds and continue to the next program.

Spybot Search & Destroy – Get the free version. Check for Updates and run a scan. After it’s done and you fix any problems, Immunize your system. Immunization blocks your computer from communicating with a long list of known malicious sites.

Malwarebytes Anti-Exploit – Get the free version. This program shields your browser from sudden attacks that malware companies don’t yet know about called zero-day exploits. You don’t need to do anything. Just install and it will work in the background.

I suggest running CCleaner, Malwarebytes, and Spybot scans once a month. You should also do it immediately if you suspect that you’ve made a mistake like following a link to a shady-looking site you didn’t mean to visit or opening a suspect file.

STEP 2 – REPLACE YOUR BROWSER WITH FIREFOX

Why: (If you already use Firefox, skip to the add-on section.) People get attached to web browsers, so please consider my reasoning if you recoiled in horror at this suggestion. Google’s Chrome is the most popular web browser in the world. That image of Google’s boss and Obama gives an indication of how closely tied to the government Google is. Google is not only one of the government’s key business “partners.” It’s the juiciest target for the government to infiltrate. Snowden showed us that it has. You can virtually guarantee that NOCs work at Google.

Google’s business is literally mass surveillance. It collects more data about more people than any other company in the world. The business model is simple. Google tracks and records you and then turns you into a profile that it sells to advertisers. As Eric Schmidt said, “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about.”

The reason Google’s services are free is because you’re not the customer. You are the product. As Google itself says, “Our customers are over one million advertisers, from small businesses targeting local customers to many of the world’s largest global enterprises…” It’s biggest customer is of course the U.S. government (federal and state).

In contrast, Firefox doesn’t track you and sell you as a product. The developers of Firefox are highly vocal about being anti-surveillance. Firefox is open source, meaning any programmer can audit the code to see what it’s doing. And Firefox has add-ons that are necessary to thwart tracking and surveillance. (Chrome has add-ons too, though many of them contain malicious code.) Bottom line is the Firefox people aren’t in the surveillance business.

If you’ve been using Internet Explorer, know that it’s being phased out by Microsoft and has been plagued with security flaws. And it doesn’t support important add-ons needed to protect you.

If you’re on Mac, I recommend Firefox over Apple’s Safari browser as a matter of diversifying trust. At the end of the day we’re trusting all software we use not to exploit us. But Firefox doesn’t have the financial incentive like Apple does to track you. And while Firefox is open source, Safari is not. Also Firefox has a more robust collection of add-ons.

What to do: Install Firefox and set it as your default web browser. After you have Firefox running, click the Options button (the gear icon), click the Update tab, and select “automatically install updates.” Then install these security add-ons. (Each add-on puts an icon in the Firefox toolbar for quick access to its settings.)

HTTPS Everywhere – (click “Install in Firefox”). This increases the difficulty of bad guys intercepting what you see in your browser and makes it harder for them to set traps that can give them access to your computer.

Adblock Plus – This protects you from some sites that are set up to install malicious software on your computer. It also blocks ads from companies whose business is surveillance (like Google and Facebook which track you even when you’re not on their sites). If there’s a site whose ads you want to see you can easily tell Adblock to show ads for that site. When you install Adblock, a confirmation screen will appear. Scroll down and turn these switches ON.

Privacy Badger – (click the ‘download for Firefox’ link). This add-on pays attention to when you’re being tracked by a browser cookie and then deletes it. There is some overlap with AdBlock Plus, but Privacy Badger fills in some gaps because it doesn’t rely on block lists.

Random Agent Spoofer – When you visit web sites your browser sends information about its configuration that leaves a unique digital fingerprint. This fingerprint identifies you. If you’re curious you can see the print it leaves here. Install Random Agent Spoofer so you don’t leave prints wherever you go.

Ghostery (optional) – If for some reason you try AdBlock Plus and don’t like it, Ghostery is a solid alternative to try. I suggest using one or the other. If you use it I don’t recommend enabling GhostRank. (The program will ask when you install it, saying that its data collection is anonymized). Anonymized data collection isn’t necessarily anonymous.

NoScript (optional) – NoScript is optional because there’s a substantial learning curve. NoScript makes web browsing more secure, but the price is that many sites won’t display properly until you tell NoScript which parts of the site to allow. Once you set the permissions for a site, NoScript will remember them. But there’s that initial few seconds at a new site where you may need to allow the core parts of the site for it to display correctly. It took me a couple days to get used to it, but this article gives good guidance if you need help. If it’s not too intimidating, give it a try. You can always remove any Firefox add-on if you don’t like it.

STEP 3 – USE A SURVEILLANCE-FREE SEARCH ENGINE

Why: Google tracks and records your search terms along with when you entered them as part of its profiling analysis. Yahoo and Bing do the same thing. By analyzing every search you make, a shocking amount can be learned about you. You can get the same search results without being tracked and profiled.

What to do: The good news is you can get Google’s search results without being tracked and recorded. StartPage is an anonymized version of Google, meaning it asks for search results on your behalf so that Google doesn’t know who is doing the asking. Go to StartPage and click “Add to my browser” and make it your default search engine. If you want non-Google search results, use Ixquick for a composite of several other search engine results. Both are excellent. Just make sure you set one of them as your default search engine. One other option is DuckDuckGo, which also doesn’t surveil you, though I prefer the search results of the other two.

STEP 4 – END THE PASSWORD NIGHTMARE

Why: Passwords are our bread and butter security measure. We use them every day to guard our accounts, assets, and personal information. The nightmare is that passwords as a security measure totally suck. The majority of passwords are so weak that they’re hacked within seconds. The security industry desperately needs to innovate beyond passwords, but we’re stuck with them for now.

The reason passwords suck is it’s really hard to remember a strong password, much less a strong password for every account you have. So people end up using weak passwords, and they use the same one or two passwords everywhere. This is a security disaster.

Massive advances in computing power and password cracking software have made once-strong passwords a joke. Ed Snowden put it simply. The government can make 1 trillion password guesses per second. Free agent bad guys can make trillions of guesses too; it just takes them a bit longer. And the guesses are educated, not random, starting with databases of millions of real passwords which have already been hacked.

The disturbing truth is that 99% of the passwords people use are easy to crack for a reason. The same strategies we use to make passwords memorable are the very same strategies hackers exploit to crack them.

Hackers study how we come up with passwords – the most common words, the way we combine them, and the modifications we make. Then they write software that tests variations of those strategies using alternate spellings (like “l34rn” instead of “learn”), famous dates, names, movies, sports teams, addresses, combinations of your personal and family info, phrase and quote dictionaries, song lyrics, et cetera.

Even when we think we’re being really clever, we’re not. One site recommended taking an easy-to-remember password and then shifting your hands over a key to the right to type it. So Happydays would becomeJs[[ufsud. Seems like a great idea since the password now looks totally random. Except it’s not random at all. Hackers know this strategy too and can easily write software to apply the key shift strategy against all the other educated guesses they’re making.

Even if you do have a strong password, if you’re using it (or a slight variation of it) multiple places, you’re opening yourself up to attack. Even if the password is rock solid, the web sites we entrust our passwords to get compromised. Google, AT&T, Apple, Home Depot, Ebay, Target…all have been hacked at various times.

You can have the strongest password in the world, but if the system storing it is defeated, the attacker will have access to wherever else you use that password. And they’ll try variations of it too.

Given the disastrous state of passwords, we have to know how to make strong, unique passwords which can withstand sustained automated attacks. But what if you have 20, 30, or even 100 web site accounts? Fortunately the market has provided us with password management software that can generate and remember strong passwords with minimal effort. But the master password to access the manager needs to come from you and obviously be very strong. Same thing with the password to access your computer and phone.

What to do: Before we get to the password manager, it’s imperative that you know how to create strong, memorable passwords. I’ve researched a bunch of approaches and incorporated them into a basic methodology.

I can’t get overly specific about how to use the method because a specific strategy that’s public is easy to reverse engineer and crack. For example, people think the strategy of taking a famous phrase like “to be or not to be” and using the first word of each letter – tbontb – is a good password strategy because it looks so random. It’s actually a lousy password because it’s too short and that first-letter strategy is well known. Any good password cracker will run that strategy against databases of famous phrases, quotes, lyrics, poems, et cetera. So I’m going to show you how to make your own strategy using a modified pass phrase.

Unlike a password, a pass-phrase is several words. Every pass-phrase you make should be at least six words long. Here’s the catch. The words can’t be something you’d find in a database, like tobeornottobe, or variations of it like t0b30rn0tt0b3 or ToBeOrNotToBe! These are all readily cracked.

You need six words that mean something to you personally, but not to a bunch of other people. That’s the key. When people hear they should use a pass-phrase, they often pick something others would too, like newenglandpatriots or dancetillyoudrop. Not strong. It’s got to be 1) personal to you and 2) quirky. For example, mysizzlingloveaffairwithbacon is good because it’s pleasant to type, easy to remember, and the wording is quirky, not just a simple statement like ieatbaconeveryday. Even if you knew me and my affinity for bacon, mysizzlingloveaffairwithbacon would still be extremely difficult crack. (Don’t use this passphrase even if you share my love of bacon.)

So to review, we want personal and quirky – not literal information, like iwenttowaldonhighschool or ihavetwoyoungersisters or mymomisnamedsallysmith.

By the way, some people use totally random words like cowhandlestringredplentywindow, but I find that much harder to remember. It’s very secure though because it guarantees the user won’t pick an obvious or famous phrase. But a quirky, personal pass-phrase will not only be easier to remember, it won’t be annoying to type.

Make sure you use 6+ words. The difference in typing time between six or seven words versus two or three is only a couple seconds, but the difference in password security is gargantuan. The word count is much more important than the word length. blueantsfreakmybedout is strong even though it’s made of short words. Don’t skimp on word count.

Also know that you can include spaces in your passphrases (blue ants freak my bed out). I didn’t just to make the examples I’ve provided easier to distinguish from the text.

Now that you know how to make a quirky personal pass-phrase, we’re going to add one more layer of security. We’re going to apply a modification to the pass-phrase. Why? Because if an adversary figures out you’re using a pass-phrase, lower-case English words with no modification will be the first line of attack. The relentlessly increasing speed of computers means you might be vulnerable even if you use six words. Also if you unknowingly pick a common phrase like a famous quote or line from a song, the modification can save you from being cracked.

One example of a modification is to capitalize the first word of the pass-phrase – Mysizzlingloveaffairwithbacon. This modification is the most obvious one though, and bad guys know that, so pick something else. Pick anything that does something with capitals, punctuation, numbers, or any combination of those. Do your own thing, even if it’s simple. That’s better than a common modification like using leetspeak (e.g. substituting 3 for e, 4 for “a,” and 0 for “o”). Hackers have common modifications like this nailed.

It doesn’t need to be finger-twisting to type. You could even integrate the modification into the context of the passphrase itself, like eat8baconstripsEverymorningyay! That’s a deliciously strong password that you shouldn’t use.

An extremely powerful modification technique you should consider is swapping one or more of your pass-phrase words with a foreign language equivalent. Don’t bother with foreign words that are so popular that they’re used in English too, like nada or mucho. It doesn’t matter what language you pick, even Pig Latin, as long as you can remember the word. mysizzlingloveaffairwithaconbay turns “bacon” into Pig Latin, pun intended.

You’ll only need to invent and remember a pass-phrase to unlock your password manager and to log into your (soon to be encrypted) devices. The rest will be handled by your password manager.

If you’re nervous about forgetting a new strong password, you can write it down until it’s grooved. Some security people will tell you to never write down a password, but writing down a strong one is far better than having a weak password. Just don’t put the password someplace obvious, like next to your computer. The odds of somebody breaking your weak passwords online is exponentially higher than somebody breaking into your home and finding your passwords.

If you write down a password, here’s a technique in case someone finds the paper and tries to use it. Insert some dummy characters into the password that you’ll recognize as not being legit but which will fool others. You could add something, like your year of birth, as a decoy. So it would be, for example, mysizzling1980loveaffairwithbacon. If somebody finds and uses it, when it fails they’ll think you’ve changed your password.

Picking a Password Manager

A password manager does two critical things. First, it remembers all your passwords in an encrypted vault (except of course the password to access the vault). And second, it can replace your crappy passwords with automatically generated very strong passwords.

After you’ve chosen a manager, you’ll want to make sure that you’ve told Firefox not to remember your passwords. Go to Options ? Security and uncheck “Remember passwords for sites.”

There are several password managers to choose from. They all have pluses and minuses. Here are a few I think are worth your consideration. Using any of them will massively improve your security, so go with whatever seems to suit you best. They are all free to try.

KeePass has been around a long time. It’s open source, free, and everything is stored on your machine. None of your passwords are uploaded to the cloud (a third party’s servers), so you don’t have to trust strangers to keep your passwords safe. But KeePass has a clunky interface that takes some getting used to. It’s also less convenient for the same reason that it’s more secure: Having your passwords in the cloud means you don’t have to worry about backing up the password vault or syncing your vault with other devices. With KeePass you have to back up your vault because if your computer dies or is stolen, you’ll lose all your passwords. And if you change a password, you need to manually sync the vault with any other computer or mobile device you use. KeePass was originally written for Windows, but because it’s open source there are multiple versions for all platforms to choose from.

Next we move to cloud-based managers. Dashlane has an elegant interface and is feature rich. Lastpass is the most popular manager and is also feature rich. They have a lot going for them, but both companies are based in the U.S. and subject to strong-arming. They promise that they store your passwords in an encrypted form that they can’t access, but there’s no way to know for certain because it’s not open source software.

If either company gets a government demand to divulge customer data or compromise their software with a backdoor, they will be legally gagged from telling people about it. I’m not making a value judgment against the companies – they seem very sincere and well-intentioned. But let’s not fool ourselves. Nobody at these companies is going to go to prison protecting your or my security. That said, Dashlane gives you the choice of storing your password vault locally (no copy in the cloud). If you’re willing to handle backing the vault up, that provides a substantial measure of assurance.

Another good choice for a cloud-based closed source manager is 1Password. One benefit it has over Dashlane and Lastpass is that it’s not in the U.S. The company is Canadian, and they point out that they have key people based in four different countries. If a demand was issued with a gag order, the principals in the other three jurisdictions could alert customers that their security was compromised without being tossed in prison.

Last but not least, my favorite choice is Encryptr, a free and open source cloud-based manager and e-wallet. Encryptr is zero-knowledge, meaning you don’t have to trust a third party to keep your passwords safe. You get the benefit of cloud storage without the risk of trusting closed source software. It’s not nearly as feature rich as 1Password, Dashlane, or Lastpass, but I personally like simplicity. And when it comes to all your passwords, open source transparency and zero-knowledge are arguably an overriding consideration.

I encourage you to try two or three out and see what feels right to you. Don’t stress about your choice. Whatever you pick, you’ll be massively more secure.

The final step with any password manager is to visit every site you have an account with and replace the old password with a newly generated strong password. Yes it’s an annoyance, but you only need to do it once. The payoff in security is enormous. (And don’t forget to turn off Firefox’s password storage: Options ? Security ? uncheck “Remember passwords for sites.”)

STEP 5 – ENCRYPT YOUR COMPUTER

This means your computer’s hard drive(s) and any external hard drives.

Why: If you currently use a password to log onto your computer, that doesnot protect the information on your computer. The log-in can be circumvented with little effort by anybody with modest skills. Your drive needs to be encrypted, or your data is exposed to anybody with access to your computer.

If your computer is ever stolen, you’ll be out a computer but encryption means you won’t have to worry about being blackmailed, defrauded, stalked, or having your life otherwise hacked to bits.

If your internal or external hard drive dies and you chuck it or take it to get repaired, a stranger won’t be able to take it and recover all your data on it. They will only find an encrypted volume.

If your computer is ever confiscated at an airport, a border crossing, or in a government raid of your home, everything on it will be inaccessible rather than wide open.

***For Apple desktops and laptops only***

Apple ships its desktop and laptop computers with built-in encryption called FileVault. Follow these directions and turn it on. Don’t store your security key with Apple, and don’t store it on iCloud where Apple can be forced to disclose it or expose it in a security breach. Use the third recovery option: a strong passphrase. If you’re nervous you’ll forget it, print it out and store it someplace safe (not with the computer). And if you print it use the tip about printed passwords: Insert some dummy characters into the password that you’ll recognize as not being legit in case somebody finds it.

If you have external hard drives, you should encrypt those with FileVault too.Here’s how.

If you don’t want to trust Apple with your encryption (e.g. the possibility of a government back door), there is a free and open source solution. Veracrypt. It’s the successor to a highly respected encryption program called TrueCrypt. Unfortunately using Veracrypt is more complicated than File Vault, so expect about 30 minutes of learning curve. You can use VeraCrypt to encrypt your main computer drive and any external drives. It also can create an encrypted “file container,” which is like having a virtual hard drive of any size you choose where anything you put in it gets encrypted. For example you could make a 1 gigabyte file containers, put all your most important documents in it, and then put that file container anywhere – USB drives, the cloud, wherever – and your data is secure even if someone gets their hands on the container. (You can use Veracrypt to make file containers even if you use FileVault to encrypt your drive.)

Here’s the VeraCrypt documentation, most of which you don’t need to read to benefit from the core functionality of the program. (The default options are fine to use unless you need advanced features.) You can also search Youtube for several Veracrypt tutorials. The Beginner’s Tutorial is a good place to start. It will show how to make a file container. Once you feel comfortable making a file container (make and delete a couple just to get the hang of it), then try encrypting an external volume, like an external hard drive. The final step is to encrypt your main drive.

***For Windows PCs and laptops only***

Just to reiterate, having a Windows password will deter a nosey passer-by from going through your computer, but it is does not provide meaningful security.

You have a few decent options. The first is to use Microsoft’s disk encryption, which is called BitLocker. It’s free if you already are running Windows Vista Ultimate or Enterprise, Windows 7 Ultimate or Enterprise edition, or Windows 8 or 8.1 Pro or Enterprise edition. If you’re not you’ll need to upgrade to use BitLocker. Here’s a guide to get started if you want to got his route. My one criticism of BitLocker is it’s closed source, so nobody can tell if it has government backdoors. (Also new Windows 8.1 PCs ship with “Pervasive Device Encryption,” but Microsoft forces everyone to upload the encryption key Microsoft, so it’s not truly secure.)

The other option is to use the free and open source Veracrypt. It’s the successor to a highly respected encryption program called TrueCrypt. Unfortunately using VeraCrypt is a bit more complicated than BitLocker, so expect 20-30 minutes of ramp up. You can use VeraCrypt to encrypt your main computer drive (the one with your operating system on it), as well as any external drives. It also can create encrypted “file containers,” which is like having an encrypted virtual hard drive of any size you choose. Anything you put in a file container gets encrypted. For example you could make a 1 gigabyte file container, put all your most important documents in it, and then put that file container anywhere – usb thumb drive, cloud storage, wherever – and your data is secure even if someone gets their hands on the container file (assuming you used a strong passphrase).

Here’s the VeraCrypt documentation, most of which you don’t need to read to benefit from the core functionality of the program. (The default options are fine to use unless you need advanced features.) You can also search Youtube for several Veracrypt tutorials. The Beginner’s Tutorial is a good place to start. It will show how to make a file container. Once you feel comfortable making a file container (make and delete a couple just to get the hang of it), then try encrypting an external volume, like an external hard drive.

The last step is encrypting your system disk (your main drive, typically the C: drive). To do that you need a CD burner and a blank disk to make a Rescue Disk in case there’s a problem. If you’re not technical it’s a bit scary, and I appreciate how much it sucks to feel technically intimidated. So if you get freaked out, either use BitLocker if you have it, or make a big VeraCrypt container (they can be whatever size you want) and keep all your private data in there. A VeraCrypt container is pretty quick and easy to make, and you can copy it anywhere just like a regular file.

DiskCryptor is another free, open source alternative that is a bit easier to use (and has fewer features). Here’s a tutorial video that walks you through how to encrypt your main drive step by step.

STEP 6 – SECURE YOUR MOBILE DEVICES

Why: If your phone or tablet is ever stolen the last thing you want is to worry about is having all your contacts, email, photos and other personal info in the hands of bad guys.

I know people who have had phones taken into back rooms during random airport security questioning. You really want your data encrypted with a strong password in a situation like that because all of your phone’s data can be cloned very quickly.


Because you can be arrested for trivial infractions such as driving without a seatbelt or having unpaid parking tickets, even the smallest crimes can be combined with narratives cops are trained to concoct about reasonable suspicion to pry open the door for a full-blown search of your digital life using sophisticated analytical tools. The only protection you have – and it’s great protection, thankfully – is to encrypt and password protect your mobile devices.

Needless to say, if a police officer or other government agent tells you to unlock your phone, politely refuse. If you comply, anything they find can be used against you. And it doesn’t matter whether you’ve been Mirandized or not. No matter how certain you are that you haven’t committed a crime (re-read the Into the Abyss section again if you think you’re innocent), there are officers who will plant evidence and fabricate testimony, so don’t give them rope to hang you. This guide provides essential guidance on how to interact with police.

***for iPhone and iPad users only***

TouchID – If you have an Apple device that has TouchID, I recommend using it.

Passcode – Many people don’t even put a passcode on their iOS device. Hopefully it’s clear by now that doing that is pretty much like begging for misery.

If you don’t have a passcode, from the home menu tap the gray settings icon. Then tap the “General” settings button and choose “Passcode Lock.” Tap the “Turn Passcode On” option at the top of the menu. Turn “Simple Passcode” OFF and choose a real passcode – at least 10 characters. Will it be annoying at first to spend an extra 2-3 seconds unlocking your phone? Yes, but you’ll get used to it.

People who use the “simple passcode” option might as well not have a passcode. Anybody who is determined can guess a 4 digit password within a couple hours, often within minutes since people pick obvious ones like 1111, 1234, 4321, 4444, 1357, 3579, et cetera.

If the extra 2 or 3 seconds to enter a real passcode is unpalatable, at the very least turn the “Erase Data” option to ON in the Passcode Lock settings page – and don’t use an obvious 4 digit code.

Don’t Trust – Apple’s attempts to make things automatic can lead to critical security breaches. Here’s one many iPhone users don’t know about. Say a coworker is going to put a file on your iPhone, like a sales video you both made together. You plug your iPhone into his Mac. Up pops a question asking if you “Trust” his computer. If you say ‘yes’ and you have your iTunes set to backup iPhone data automatically, ALL your iPhone data will be copied to your coworker’s computer – contacts, messages, email, photos, everything. So don’t “Trust,” or make sure you have automatic backup turned OFF.

***for Android users only***

Cyanogenmod – Manufacturers of Android devices install various software that they ship with the device. You really don’t know what that software is doing. It may track you, and it’s often “bloatware” that slows your device down. A solution is to install Cyanogenmod. If you have a device on this list, then you can use the Installer which makes things easy. If you don’t have a device supported by the Installer, I would skip it unless you want to roll up your sleeves and get fairly technical.

There are many advantages to Cyanogenmod. Your device will run faster and have some extra privacy features. Here’s a good roundup to judge if you think it’s right for you. If you want to give it a go, this is where you start.

Encrypt your device – While iPhones are encrypted by default, Android devices generally are not. (Some new Android models like the Nexus 9 are shipped with encryption on by default, and fortunately most other new Android devices will follow suit shortly.)

Be aware that if your Android device is more than a couple years old, encrypting it will make it perform more slowly. I think it’s worth it, but it bears mentioning since this is the case for older models. You can try it, and if it’s not workable for you, you can unencrypt the phone, but know that unencrypting it will factory reset it. Newer Android devices don’t suffer any noticeable performance hit.

When you enable encryption, you’ll need your phone to be mostly charged as well as plugged in. It takes about 30-60 minutes. Go to Settings->More->Security->Encrypt device. Here you’ll of course want to pick a strong passphrase that’s ideally easy to type. Remember without a decent passphrase there’s not much point to the encryption. Will it be annoying initially to spend an extra 2-3 seconds unlocking your phone? Yes, but you’ll get used to it. It’s worth it.

Be sensible – I agree with this article’s advice that you generally don’t need anti-virus software for Android devices if you’re sensible about sticking to legit-looking apps from the Google Store or other trusted sources that seem legit. Also avoid apps that demand unreasonable permissions to access to your phone. If you’re downloading a game and it wants permission to access all your contacts or dial phone numbers, for example, I’d skip it. The freeDCentral1 app lets you monitor what permissions your apps have.

STEP 7 – USE SECURE CLOUD STORAGE

Why: If you’re going to upload files to cloud storage like Dropbox, Google Drive, iCloud, or OneDrive, use a service that encrypts your files before they are uploaded. No matter what Dropbox claims about security (and they’ve been caught contradicting themselves), you don’t want to trust any company with your personal files. The Dropbox site says, “Dropbox employees are prohibited from viewing the content of files you store.” Saying people are not allowed to look at your files is not security you can count on, nor is it protection from the government surveilling your Dropbox.

What to do: To quote Snowden, “Get rid of Dropbox.” Snowden’s suggestion is to use SpiderOak because it’s zero-knowledge, meaning they encrypt your files before they’re uploaded, making it impossible for the company to see the contents of what you store on their servers. The first 2GB on SpiderOakare free. An alternative to SpiderOak that takes a similar approach is Wuala, which gives the first 5GB free. Also worth considering is open source encrypted cloud storage such as Seafile (1GB free) or the mostly open sourceCyphertite (8GB free).

Any of these options are far better than Dropbox, Google Drive, et cetera. Since they all give free storage space, maybe try out two or three.

STEP 8 – SHUN SURVEILLANCE-BASED SOCIAL MEDIA

Why: Many people in this world are lonely. “Free” social networks like Facebook are designed to capitalize on this. In return for helping you feel connected to others, they study you like a lab rat and turn you into a product. I’m not exaggerating. As the founder of Facebook said, “They ‘trust me’ – dumb fucks.” Meanwhile he surrounds his home with empty lots and hundreds of acres of undeveloped land.

Facebook’s “like” system is designed to reinforce whatever your existing beliefs are. Facebook is engineered to be a giant echo chamber which figures out what you like to hear so it can feed it to you. That’s how it hooks people.

It’s also the ultimate propaganda system. Recall Facebook’s notorious social engineering experiment which proved it could manipulate the mood of over half a million people by altering their feeds. The experiment received funding from the US Army Research office. The military funds research on the mass manipulation of a population’s mood? You don’t say.

As with Google, Facebook’s core business is mass surveillance. You’re the product, not the customer. Facebook collects and stores an insane amount of intel about every facet of your life. It not only tracks everywhere you go, it lets others track you too.

Facebook has developed software as accurate as the human brain to reveal your identity in any photo you or someone else uploads. And yes, even 4 years ago Facebook was tracking you and assembling hundreds of pages of intel on you even when you weren’t logged in. Now it’s thousands of pages, and the surveillance and analysis are much more sophisticated.

Every time people post photos of themselves and others to Facebook, Instagram (owned by Facebook), Twitter, Google, or other surveillance-based services, they are unwittingly building mass surveillance databases containing the details of people’s appearances, who they associate with, what they do, and when and where they’ve been.

A single innocuous photo can reveal a lot of information. Trillions of photosis a frightfully vast surveillance database to be exploited by regimes, corporations, and free agent bad guys. Mass surveillance depends on social media as a primary data source.

Every American technology mega-corp has backdoors. Snowden made it clear: Tech giants are surveillance proxies for the government. The government’s own top secret slide is worth repeating here as it just says it all.

The Mass Surveillance ComplexThe Mass Surveillance Complex

To put it plainly, Facebook and other “free” social media services are mass surveillance roach motels. Free is the bait to get you in the door, and surveillance intel is used to hook you on the service so you can become a forever profitable product. Yes they are slickly marketed, convenient, and ultra-popular. They are also a trap and indispensable to the mass surveillance scaffolding. Check out of the roach motel.

What to do: It’s easy to share photos with friends and family without undermining our security by using encrypted cloud storage (step 7) or encrypted messaging and email (coming up). But to some the prospect ofopting out of Facebook or other social networks is unthinkable. But is Facebook actually improving the quality of your life? Are you now happy and fulfilled because of Facebook? If you’re willing to try, here are some suggestions for breaking the addiction.

If you’re unwilling to reject surveillance-based social media, at the very least adjust the “privacy” settings as tight as you can so that your life isn’t an open book to free agent bad guys. Facebook and Twitter are primary research tools for hackers and stalkers, and of course police and surveillance agencies. They use fake profiles to friend you and gather intelligence. Or impersonate you and use you as an unwitting honeypot. The NSA evenimpersonates Facebook.

You can replace surveillance-based social networks with non-surveillance alternatives. I’m a member of Liberty.me, a member-funded social and publishing network. Because its members are its customers, Liberty.me eschews a surveillance-based business model. Members can sign up with fiat money or bitcoin. Unlike Facebook which demands people use their real names, you can choose any name you’d like and reveal your identity only to those you personally trust.

I haven’t tried them, but Diaspora and Friendica are two other social networks which are not surveillance based, and there are others in development.

STEP 9 – ENCRYPT YOUR EMAIL, CHAT, AND TEXTS

Why: Your email, chat, and texts desperately need to be secure. They are a jackpot of personal information about your life that can be used to harm you in any number of ways. It doesn’t matter if you think your life is not particularly exciting. People who stalk, extort, kidnap, and blackmail don’t limit their targets to hard-partying celebrities. Your email gives a treasure trove of leads to bad guys about how and where else they can invade your life. Surveillance-based email options like Gmail are not encrypted, and your email is automatically scanned and analyzed for packaging you to advertisers.

Companies that offer closed source software which claim to use robust end-to-end encryption are not worth considering unless there are no other options (and fortunately there are). A perfect example is WhatsApp, owned by Facebook. The company says it uses and likes open source, and yet WhatsApp’s code is not open source. Being closed source, people have no way to verify the quality of the encryption, whether there are bugs in the implementation, whether there are backdoors, and what is happening to your data behind the scenes. There have been several security breaches, but as with all closed source software, we don’t know how many security flaws are being quietly exploited right now.

The same issues make Skype untrustworthy despite its claims of secure encryption. Microsoft scans your Skype messages, and there have been back-doors in Skype and other Microsoft products for years.

The bottom line is no matter how exciting and promising the security claims, any closed source software, especially if offered by a U.S. based company with U.S. backers who fund military contractors, is fundamentally unable to provide reliable security assurances.

What to do: Replace your communications software with encrypted alternatives. Email, chat, texts, and phone calls. (Yes, even SIM card manufacturers have been hacked.)

Texting:

Open Whisper Systems – Signal for iOS. TextSecure for Android.

Telegram – iOS, Android, Mac, Windows, Linux

Phone calls:

Signal for iPhone. Red Phone for Android.

Chat:

CryptoCat – iOS, Mac OS X, Firefox add-on

ChatSecure – iOS and Android.

Telegram – iOS, Android, Mac, Windows, Linux

Adium – Mac OS X

Email:

If you like the convenience of using a webmail account, choose a provider who uses built-in encryption. I like Tutanota, Protonmail, Neomailbox, and Countermail. (I’d recommend Startmail too if they accepted bitcoin.) They all use an open source, gold standard encryption called PGP. Tutanota deserves particular recognition because it’s entirely open source. Some of them are subscription based, and some operate on donations. Unlike Gmail and its ilk, these all have robust privacy policies, are hosted outside the U.S. (making them harder to strong-arm), and make the encryption process seamless.

By contrast, if you want to use a local email client like Thunderbird, the only way to do so securely is to configure and use PGP yourself. Doing that onWindows and on Mac is frankly a huge pain in the rear for non-technical people. Even Glenn Greenwald, the reporter who broke the Snowden story, couldn’t follow the tutorial Snowden made for him. Upstart Whiteout looks like it’s trying to make the process far easier.

If you’re dead set on using an insecure mail provider like Gmail, Yahoomail, or Outlook, your best bet is to use Mailvelope to incorporate PGP encryption. It’s still a hassle to use, though, compared to Tutanota and the others who do the encryption for you automatically.

I realize that switching email providers is a big deal (as far as these things go). But notifying people that you’re switching to an encrypted email provider is a desperately needed message people need to hear. Overcoming mass surveillance is more of a motivational challenge than anything else. Mass surveillance is packaged as just another news item to shake your head over. But personal action is the only thing that will inspire others to take it seriously. Mass surveillance is not a news items. It’s a silent war being waged against us.

When you choose an email address, consider not basing it on your name. There are constant security breaches at companies resulting in email addresses getting lifted along with other potentially embarrassing info. If your email address also reveals your name, it gives bad guys another piece of data to work with in taking you apart.

STEP 10: USE A QUALITY OFFSHORE VPN

Why: You have an ISP who provides you with internet access. The problem is that ISPs monitor and record your activity online. Net neutrality will onlyintensify the monitoring as ISPs are turned into government regulated utilities.

The same monitoring happens when you’re at a coffee shop, airport, hotel, or other public wifi. But at those places it’s even worse because anyone with technical skill can monitor what you’re doing in addition to the ISP.

That’s where a VPN comes in. It stands for Virtual Private Network. The main benefit it offers is to encrypt your Internet traffic. Neither your ISP or the creepy guy at Starbucks will be able to track what you do online.

What to do: Choosing a good VPN is key. This is the one step in this guide where I urge people to avoid the free route. There are free VPNs, but they are slower and typically have lousy privacy policies because they target you with ads to compensate for the VPN being free. VPN services require substantial capital investment, so you really want to be a customer rather than the product for advertisers. It’ll cost around 15-20 cents per day. Hugely worth it for the security benefit.

What you want is a reputable VPN that uses strong encryption and a “no log” policy. You also want the VPN to be based outside the U.S. Otherwise the company can be legally gagged and crushed like Lavabit. I suggest choosing one of the VPNs from the list provided here.

ESSENTIAL SECURITY PRACTICES

Congratulations on taking action! The process of hardening your security gives great perspective on just how insecure our digital lives are. No wonder we’re constantly hearing about security disasters.

The following practices are for the most part quick and simple to adopt. They can save you untold grief.

PDF and Word doc risks. Adobe pdf files can be rigged with malware. If you download or receive a pdf from an unknown or untrusted source, scan it with your virus scanner before opening it. Also disable Javascript in your pdf reader. If upon opening an untrusted document you are solicited to click on a hyperlink, it’s likely a trap. Same for Microsoft Word documents. Avoid opening them unless they’re from a trusted source.

By the way, if you’re tired of paying for Microsoft Office, switch to the free and open source Open Office. It reads and writes Microsoft Word, Excel, and Powerpoint files.

Recognize when “free” is a trap. Bad guys know that free things are enticing. There’s a lot of wonderful free and open source software (FOSS). But there’s even more free software out there that despite promising great benefits is malicious. Exercise caution and do some web searching first to see if a program is malware before you try it out. A little due diligence can quickly confirm what’s legit.

The same warning applies to free reports or books sent as pdf files or Word docs. Typically they promise to deliver health, sex, or money-making secrets. Documents can have malware embedded in them, as can the sites that promise to give you access to them.

Keep Adobe Flash up to date, or better, dump it. If you decide to use Flash (many sites and online games use it), make sure you keep it up to date because it’s been plagued with security flaws. Adobe Flash will also try to slip in McAfee Security Scan during the installation. The installer annoyingly opts you in by default because Adobe gets an affiliate kickback. I suggest notallowing McAfee to be installed (uncheck the box). It’s a crippled version of McAfee’s paid product that will say your computer is at risk until you purchase it, and it’s a pain to uninstall. If it slipped by you already and you want to uninstall it, here’s how. Or even better, uninstall Flash and see if you can get by without it.

Cover your webcam when you’re not using it. Even five years ago public school employees were remotely turning on web cams and secretly recording students at home. Plenty of malware and commercial stalkerwareout there does the same thing. Most desktop computers don’t have a camera or microphone, so you can disable them both just by unplugging your webcam when you’re not using it. And that little dot above your laptop screen where the camera lens is? Cover it up with a bit of post-it note or black electrical tape. It takes 3 seconds to cover and uncover the lens, so just groove the habit. Unfortunately there’s no easy fix I know of to physically enable and disable your computer’s mic.

If you have an Android device, here’s an inexpensive app that can disable your camera and microphone, which can be remotely activated and used as a surveillance device.

Use two-factor authentication (2FA). 2FA uses two security tests to permit access to information or physical resources. One example is an ATM card and a PIN code. Another is a password and a fingerprint. The more factors you add, the harder it is for bad guys to crack. Just going from one to two factors provides a huge increase in security. Many mobile devices can take advantage of 2FA. The downside is it’s usually more inconvenient to use. Bad guys are counting on you to be dissuaded by that, so use 2FA whenever you can. Here’s a directory of sites that support 2FA.

Have kids? Parental controls. Kids are a security nightmare. Gold stars to you if you teach them how to behave intelligently online. Just recognize that it’s highly unlikely they will always follow your instruction. Kids are particularly resourceful about things that are forbidden. If they ask you to buy a movie or video game for them and you say no – if they ask at all – they may decide to find it online. Whether or not you approve of that, “free” software is a honeypot for malware.

Bad guys are smart. They’ll offer a “cracked” copy of a video game, for example, but the act of installing it will also surreptitiously install malicious software that can do anything from stalking you to recording everything you type (including passwords) to sending files from your hard drive to bad guys. A lot of malware also turns your computer into a zombie that infects other computers on the web. If you care about not harming others online, use measures to avoid becoming a tool for bad guys to go after others.

Both Microsoft and Apple provide parental control settings for choosing what can be downloaded and visited on the web. There is also free third party software that gives you more options, as well as parental control apps for mobile devices. Consider these options carefully unless you have full confidence in your kids and their friends.

Encrypt individual files and folders. There are lots of reasons for encrypting individual files or folders. Maybe you need to email files to people who use insecure (unencrypted) email like Gmail or a corporate email address. Maybe you want to put files on a USB stick and take them someplace. Maybe you need to upload files to somebody’s Dropbox or Google Drive account who is unwilling to switch to SpiderOak. Maybe you want a person or organization to have files in their possession but not be able to access them until a certain event happens like an accident. Maybe you want to back up a big directory full of files and keep it at a location that’s handy but not secure like the desk of an apartment filled with roommates. Or maybe you just want an extra layer of protection for very important files in case somebody accesses your computer when you’re logged in and your hard drive is decrypted.

Whatever the reason may be, there are several free programs for encrypting individual files or folders. To encrypt a file or folder full of files, I suggest the free and open source 7-zip on Windows or Keka on Mac. Both programs compress your files but also give you the option of encrypting them. There are different compression formats those programs can use like 7-zip, zip, and rar. I suggest using 7-zip format because it’s Mac and Windows compatible and the compression is good. Here’s a quick how-to for both programs. Just remember compressing files won’t encrypt them by default; you also need to enter a (strong) passphrase. After you encrypt it the name of the file like “MyAccounts.7z” or “SurpriseVacation.7z” will still be visible.

Deleted files aren’t deleted until you shred them. Any file you delete isn’t actually deleted when you trash it. All trashing it means is that you’ve given permission for the file to be overwritten. To make sure that the empty space on any storage device is actually empty rather than filled with your deleted files, you need to use a program that writes dummy data over your real data a few times. A program we’ve already used, Ccleaner, does this (use at least 3 overwrites). On Windows another option is Eraser, which is open source. An even more comprehensive one is BleachBit. Mac users can shred deleted files by selecting Secure Empty Trash. More details on Mac file shreddinghere.

Securely deleting files on SSDs (used in mobile devices, lots of laptops, USB thumb drives, and many desktop computers) is a no-go for technical reasons. That’s why it’s all the more important to make sure the drives are encrypted. If you ever want to sell or give away your Android or iOS device, do a factory reset. The encrypted data will still be there but the encryption key will be erased, making the data unrecoverable.

Privatize your purchases. Your credit card transactions are recorded and distributed to multiple government agencies. As with tech companies, the government is a direct customer of the credit agencies who give them your financial information. Like surveillance-based social media, you are the product, not the customer.

A running record of every transaction you make along with when and where you make it is a mass surveillance wet dream. Like uploading your photos to Facebook, every credit card transaction helps weave the mass surveillance net. I don’t deny the convenience of credit cards or the benefit of “points.” But as with social media, the price is hidden but high.

Use cash when you can. It’s still relatively private, which is why the government hates it. But know that having a few thousand dollars in your possession makes you a criminal suspect. If found, your cash will likely beconfiscated. Its use is gradually being outlawed and several countries arerapidly going cashless.

Also know that if you try to withdraw a few thousand dollars out of your bank account you will likely be questioned and have a Suspicious Activity Report filed with the government. The same thing goes if you try to deposit a sizable amount in your account.

Precious metals are also difficult for the government to track. While they can be a great way to hold onto your savings in a zero-interest QE-driven world, the problem is it’s difficult to purchase things without resorting to barter.

So how to deal with the fact that withdrawing or holding cash in meaningful amounts has become a serious liability? More people every day are turning to non-government digital currencies. These non-government currencies are called cryptocurrencies because they are secured against counterfeiting through their use of cryptography. The most popular cryptocurrency is bitcoin.

There are many good reasons to use cryptocurrencies. The first is that you have monetary independence and privacy. You don’t have to fill out bank forms or get permission to access your money. You can send money anywhere in the world instantly without forms or questioning, and it costs only a few cents in fees. People who work abroad and send money home typically pay 10% in remittance fees. The compound savings by not getting clipped 10% every time is huge.

Hundreds of thousands of items can be purchased with bitcoin, including the recommended VPNs in Step 10.

The second is security. Accounts can be locked down and siphoned for bail-ins. Cash can be lost, stolen, and seized. You cannot walk around with a substantial amount of cash without making yourself a target. That is doubly true if you travel, where carrying $10,000 on a plane effectively makes you a criminal suspect.

You can carry any amount of cryptocurrency in a secure “wallet” on your phone, computer, USB thumbdrive, or even your camera’s flash card without anybody seeing what you have. Your wallet can be backed up the same way you would back up any computer file. If your phone or computer get stolen, the money can’t be spent without the key to your wallet. You can copy your wallet as many places as you want and even print it out as a paper wallet. You also can split your money into as many wallets as you want and store them different places if desired.

For the ultimate in portability and security, you can use a brain wallet. A brain wallet means that access to your money is literally only in your brain via your passphrase. There is no other way to access your wallet (so don’t forget the passphrase!) You can cross any border with just the clothes on your back while “carrying” any amount of money with you.

While bitcoin transactions are not systematically identity tracked and reported to corporations and government agencies, bitcoin purchases are not truly anonymous. While your name isn’t attached to purchases, the purchases themselves can be traced. There are techniques for anonymizing bitcoin, such as mixing. Another option if you want to make anonymous purchases is the DASH cryptocurrency, which is specifically designed for anonymity.

The third reason is cryptocurrencies allow you to hold your savings in a currency that is not being systematically counterfeited (the government term is inflated). Cryptocurrencies are new, so the primary risk in using them is volatility. Volatility can work for or against you. People love upsidevolatility; downside volatility is what makes people nervous.

The way to deal with volatility if it worries you is to dollar cost average (DCA) your cryptocurrency purchases. If you wanted to own, say, $5,000 worth of a cryptocurrency like bitcoin, you could DCA the purchases by buying $1000 in bitcoin per week for 5 weeks, for example. Or $500 per day for 10 days. The more you spread it out, the more volatility is reduced.

Lastly, use bitcoin out of principle. The government derives its power to do all the objectionable things it does from the monetary system. Fiat currencycan be created in any quantity by the government at any time and at zero cost.

Given the government’s ability to create money instantly at zero cost, tax collection today is mostly about social engineering. Paying taxes maintains the illusion that fiat money is scarce and therefore valuable. Yet with every additional trillion dollars that it snaps into existence, the government enriches itself while eroding the purchasing power of savers who treat the dollar as an article of faith. The fiat story never has a happy ending. Nobody is going to end (or audit) the Fed, but cryptocurrencies enable us to largely ignore it. That is truly liberating.

Torrent carefully. If you’ve never used Bittorrent, you’re missing out on a ton of quality content that is absolutely free. Bittorrent is a way for people to efficiently share files of their choosing with anyone else in the world. Many people think bittorrent is only for downloading copyrighted material like movies, TV shows, and music, but there are loads of copyright-free contenton bittorrent.

Whatever you download, be careful. It’s easy to download files that have been shared with the purpose of injecting your system with malware. If you’re going to use bittorrent, here are a few suggestions:

Use qBittorrent for your client. It’s open source, unlike the popular but closed source utorrent. For increased security use IP filtering andanonymous mode. For even more security use it with a VPN service that permits bittorrent use. (All the VPNs recommended in step 10 allow bittorrent use.)

Media files like mp3, mp4, avi, mov, and flac are safe to download. They don’t carry malware infections. I recommend playing media with VLC Player. It’s fast, free, open source and doesn’t spy on you.

Don’t download any software from bittorrent unless you trust the source or really know what you’re doing. Anything that requires installation (like an .exe file) is a big security risk. If you have kids, they may (will) download games from bittorrent which are likely malware carriers. (Just because a game runs properly doesn’t mean your computer hasn’t been loaded with malware.) To make matters worse, the directions for much of the software you see on bittorrent sites tell you to disable your anti-virus during installation. It’s true that anti-virus software can impede installation of some software, but disabling it for an untrusted source is a great way to get slammed with malware.

If you decide to download software from untrusted sources, at least sandboxthe program. Sandboxing is a powerful security measure, but it’s not a silver bullet.

Grow your knowledge – Once you feel comfortable using the security measures in this guide, I encourage you to investigate other ways to increase your protection. Liberty.me’s free privacy guide has some good advice that goes beyond online protection of your identity.

For more online security measures, this guide is a solid next step. Note that it’s still a beginner’s guide, which gives you an idea of how much can be done. It’s wise to remind ourselves as security beginners that we’ve only taken basic steps. This guide also offers some more in-depth advice when you’re ready. Both cover using your VPN in combination with TOR. There is a performance hit to your browsing speed, but you get substantially more privacy. Just don’t take the anonymity claim on the TOR web site as literal. There’s no such thing as bulletproof anonymity online, though when you use TOR properly, you can achieve an extremely high level of security that requires very sophisticated adversaries to defeat.

Donate – Many extraordinarily talented, principled, generous people who understand the horrific implications of mass surveillance work ceaselessly to provide free, open source solutions to protect us. I encourage you to send a market signal that their heroic work is sincerely in demand and appreciated. In other words, please donate here or to whatever open source projects you use. Also consider supporting critical resources that journalists, activists and whistleblowers depend on like SecureDrop, TOR, and Tails. They require continual development to keep pace with mass surveillance expansion. Without these resources we’d be in the dark about what’s being done to us.

Snowden is one of many who have risked their lives to expose mass surveillance and the other awful things regimes do in secret. As mass surveillance technology advances, if the tools to fight it don’t advance then resistance will become impossible. We depend on the ongoing diligence of skilled coders in a very real and urgent way.

AFTERWORD

Ok, I gotta ask. Did you skip some steps because you made a value judgment about your life? Maybe you decided to stick with Dropbox since you only put family reunion photos or cooking recipes there? Perhaps you didn’t switch to encrypted calls and texts since you think whatever you have to say will be met with indifference by those who record you.

Every bad guy and every regime banks on you thinking this way so that you don’t take action. Mass surveillance depends on mass indifference. It’s not about whether files are sensitive or whether you’d share them with someone who politely asked to see them. It’s about your power to give permission. It’s about control. Universal control. Snowden wasn’t mincing words when he risked his life to expose the greatest weapon of oppression in the history of man.

When it comes to mass surveillance, principle is inseparable from risk. If you choose not to act, everything can and will be taken without permission. Whenever down the line you decide things have gotten insufferably out of control, it will be too late to do anything. Ignoring ugly truths is how we end up looking back and wondering how things got so bad. Don’t fall for it. If you haven’t already, please act now.

Gratitude for Alan Turing

Encryption is what empowers us, the governed, the peaceful outlaws. Without it we would have no shelter from the shadow of criminality politicians have cast over us.

What breathtaking irony that the means to protect ourselves is owed to a heroic criminal named Alan Turing. The father of computer science and mastermind of cryptography, Turing broke the Nazi regime’s “unbreakable” encryption code, Enigma.

After providing the British government with its single most powerful weapon – the means to know everything the Nazis were going to do in advance – Turing was prosecuted by the regime in 1952 for being homosexual. The man who saved millions of lives by shortening war – that greatest of government abominations – was a criminal.

Alan Turing, heroic criminalAlan Turing, heroic criminal

Turing pled guilty to the crime. As punishment the government ordered him to be chemically castrated in a series of brutal medical treatments which led to his suicide two years later.

This man was a liberating force for humanity. We owe him our deepest gratitude.

Parting Thank You

The Internet is the most powerful tool we have to inform, protect, and help ourselves and others. By taking action, you are materially advancing the cause of human liberty. Our own psychology is the biggest risk in determining our fate. Will we succumb to learned helplessness? Or will we quietly and with determination cut the noose from our necks?

Together we can thwart those who seek to dominate and control. Let’s take care of ourselves, help others wherever we can, and turn away from fear, the eternal enemy of freedom.

Saturday, September 19, 2015

Big Brother Surveillance Threat, Part 2: Codified Oppression

Big Brother Surveillance Threat, Part 2: Codified Oppression

This is Part Two, of a series that Urban Survival Skills is calling "Big Brother Surveillance Threat" and is publishing, that are excerpts from a huge article titled "You Are a Criminal In a Mass Surveillance World – Here’s How Not To Get Caught", but David Montgomery and posted on Prepared Gun Owners.com
[http://preparedgunowners.com/2015/06/11/you-are-a-criminal-in-a-mass-surveillance-world-heres-how-not-to-get-caught/]

I’ve focused on the U.S. government because that’s what I know, and it tends to do these things on a broader scale than other regimes. But every regime follows the same pattern of outlawing the very same behavior it exhibits. Some just do it more aggressively than others. Generally the larger the regime, the greater the victimization of the governed.

Even when a law applies both to the government and the governed, it’s not enforced equally. Martha Stewart went to prison for lying about a stock trade, and Marion Jones went to prison for lying about using steroids. But General James Clapper, czar of the government’s mass surveillance complex, wasn’t even prosecuted for the felony of lying under oath to Congress about mass surveillance. General David Petraeus walked free despite lying to FBI investigators and leaking top-secret information. Members of the government’s Federal Reserve bankster cartel were exempted from punishment for committing multiple felonies.

What enables this codified, self-perpetuating hypocrisy? The institution of government is defined by its monopoly on both the creation andenforcement of law. This means the government can do whatever it wants, from double parking to mass slaughter with essentially no repercussions other than “regime change” through elections. Who in their right mind believes this is a good way for society to operate? If there were ever a monopoly to break up, it’s the one government protects with all its might.

As pieces of the picture came together for me, I felt depressed and wanted to throw my arms up and say, “Forget it. There’s nothing I can do to change any of this.” Then I realized. “There’s nothing I can do” are the magic words every power-hungry person longs to hear. Learned helplessness – the conviction that you are powerless to change whatever’s being done to you.

Those who watch Game of Thrones know the show has much to teach about those who seek power. The pitiful character Reek is the personification of learned helplessness. Even with a razor at his barbaric captor’s throat, he is incapable of doing anything but obeying. When his sister risks her life to rescue him, he clings to his cage and refuses to go. That’s the essence of learned helplessness.

The Greatest Weapon of Oppression in the History of Man

Every regime uses physical violence to force compliance with its rules, but physically breaking people who resist takes considerable effort, resources, and manpower. Mass surveillance gives those who seek control a vastly more powerful, far-reaching weapon.

This article was inspired by Ed Snowden’s own words to Laura Poitras inCitizenfour. He warns her that the government’s Collect-It-All mass surveillance apparatus is “the greatest weapon of oppression in the history of man.” It’s a War of Terror that’s being waged on us.

In a mass surveillance world where the law is unknowable, we live our lives wondering what crimes we’re committing and when we’ll be detected and prosecuted. This has a chilling effect on how we live. We censor ourselves to suppress the underlying anxiety of knowing we’re criminals who are being watched and recorded.

The end-game of mass surveillance is self-imposed subjugation. Threats and cages are no longer required because people believe resistance is hopeless. When we know we’re being monitored by those who have the power to beat, cage, and kill us, we imprison ourselves in our own fear.

I refuse to live that way. I hope you do too.

When people self-censor out of fear, they erect their own walls, saving government the effort. The governed avoid inquiry into controversial issues.They censor what they read at the library. They censor the web sites they visit. They censor their browser search terms. They censor what they write in emails and texts.

Free thought and inquiry into the most important matters get suffocated as we live under perpetual anxiety about whether what we do is acceptable to those who govern us. Fear leaks into our consciousness like black ink. I recently joked with a friend that he’s addicted to Coke, and he nervously wrote back clarifying “to anyone else reading” that it was Coca-Cola.

People censor what they say on the phone, on Skype, on Google Hangouts. Surveillance software automatically transcribes your words into text. Your conversations become instantly searchable and trigger key word alerts. (If you’re thinking of organizing or attending a police brutality protest, know that a trigger word list leaked years ago includes the terms cops, police,authorities, and law enforcement among hundreds of others.)

People censor what they share with friends on social networks. They increasingly limit posts to selfies, photos of food, and opinions about approved topics like sports and movies, rather than information or opinions that can land them on a terror suspect list.

They shy away from protesting and see the often brutal treatment of those who do. They hear about domestic black sites. Signing a petition opposing a government program is like handing the government a suspect list.

People come to know that political affiliations can make you an IRS target or trigger a home invasion. They read that withdrawing cash from a bank account is cause for criminal investigation. Yet if they don’t put cash in the bank, they risk outright confiscation as has happened over and over.

They see the persecution of whistleblowers and the crushing of business owners who won’t compromise their customers’ security. Innocent peopleend up on terrorist watch lists. They see the mainstream media’s bipolar twitching between terror-mongering and titillating celebrity scandals.

This all brings on a chilling sea change in our daily lives. The message becomes unmistakable. The government is off-limits to meaningful criticism or resistance to whatever it dictates.

Authority as a Conditioned Response

Obeying authority is what we’re taught to do from childhood. You don’t want trouble, do you? Then don’t complain. Follow the rules. Abide by the law.

We’re raised to follow orders and pledge allegiance to authority. We are conditioned to comply. Chain of command is a principle which pervades our society, not just the military. The apex of command is of course the head of the government, the Commander-in-Chief. What comic irony to call this individual “leader of the free world.”

What’s the upshot of our perpetual compliance conditioning? “Just following orders” and “Just doing my job” routinely precede the most atrocious acts perpetrated against other human beings.

What about those with enough self-awareness and independence of thought to see the pattern at work? The realization that mass surveillance makes you a perpetual suspect and non-compliance with any government rule makes you a criminal silences meaningful opposition. It doesn’t take many horror stories to roll a fog of fear over an entire population. Especially when people know they’re being continually watched and recorded.

Learned helplessness will get you if you don’t brace yourself and think clearly. You can’t change the system, but that doesn’t mean you’re helpless. You don’t have to be a victim. We as individuals can take simple steps to impede the government’s dragnet recording of our lives. We can encrypt our calls, our texts, our emails, our phones, our computers. We can show our friends and family how to do the same. It’s really just a matter of quiet resolve.

Most people like to read articles that confirm what they already believe. But beyond venting to friends, people are generally too lazy to take action unless they feel immediate danger. Here’s where we must differentiate mass surveillance from every other threat. Mass surveillance is a silent, invisible war being waged on us. The only time you’ll actually feel immediate danger is when it’s too late.

The Action Mindset

Are you in an action mindset yet? If not, here’s my last loving nudge. I’m begging you – seriously, I truly am begging you – to overcome inertia and take action. If nothing else has convinced you, then do it to keep government employees from oogling your genitals. Or if you think government isn’t and never will be a threat to your well-being, then do it to protect against identity theft, fraud, blackmail and doxing by free agent bad guys. People don’t understand just how much risk they’re taking by not securing their computer and smart phone. Your life can be ruined. If you’ve already secured yourself, please encourage others and help friends and family.

If you’re a parent with kids using computers, you need to know how to protect them. Kids are curious, and the more dangerous, forbidden or risky the topic, the more inquisitive they tend to be. What if your son comes home from chemistry class and wonders, just for the sake of curiosity, how to make a bomb? What if he’s watching Breaking Bad and starts browsing around wondering how Walter White made meth? What if a friend comes over and as a prank searches for how to join ISIS?

Are these the sorts of things kids might do? Of course. And it can turn your entire family into a target, including getting your home raided by men with automatic weapons who will shoot your dogs and take your computers, phones, and papers. Implement the enclosed anti-surveillance guide to protect your kids from getting your family in a world of trouble.

It’s All You

No matter what it is that motivates you to take action, the important thing is that you follow through. The best thing about the government’s bald-face lying about mass surveillance is it dispelled any notion that it will be “reformed” (whatever that means).

A few months before the Snowden revelations broke, James Clapper, czar of all U.S. intelligence agencies, replied under oath to this question (which he received a day in advance of his testimony).

Richard Nixon, after secretly bombing Cambodia (which brought the genocidal Khmer Rouge to power), persisted in lying to the public about it. As he told his aides, “Publicly, we say one thing. Actually, we do another.” True to form, shortly after Snowden came forward Obama was in full-on denial mode. The lie below was from his appearance on The Tonight Show with Jay Leno.

Literally nothing the government says about mass surveillance is credible. Every public relations gambit to make it look like “something is being done” is aimed at deterring us from taking responsibility and acting for ourselves. Don’t be fooled by political theater.

Mass surveillance programs are built in secret and they operate in secret. Remember that what little we know is due to an act of treason (as defined by the government of course). And it’s only the NSA we know something about since that’s what Snowden had access to. The CIA, FBI, DEA, DHS, INR, DIA,NGA, NRO and other agencies have their own surveillance programs.

Any NSA policy change will be publicly heralded by politicians as a great victory while other programs silently spring up or continue operating under different code names or different agencies. As with mass surveillance obliterating the 4th Amendment, all Constitutional violations are not only predictable, they’re inevitable. Trusting the government is like trusting pit bulls to guard a pile of pork chops.

Thankfully Ed Snowden gave us the guidance we need.

Snowden’s Inspiration

Snowden’s most important insight is not that we’re being recorded in a Collect-It-All panopticon. It’s that we – as individuals – have the power to free ourselves from the surveillance noose: “We have the means and we have the technology to end mass surveillance without any legislative action at all, without any policy changes.”

We have the power, but only if we exercise it. What does that amount to in practical terms? Being willing to use some free software. After a couple hours you’ll have taken action that can literally keep you out the worst kind of trouble including criminal prosecution, blackmail, and kidnapping. You may even save your life. Same goes for any friend or family member you can persuade to take action. And you’ll sleep better knowing you’re no longer enabling mass surveillance.

Some might object and say that taking defensive action is an unnecessary act of paranoia or ‘Murica hating. Those people may just be doing their job. Others may be fact-resistant humans. Fear of real risks is not paranoia. It’s motivation. Only the most fact-resistant among us would deny that there are individuals and extraordinarily powerful institutions who are actually out to get you one way or another.

Most people prefer to feel rather than think. I know I’d feel much better pretending all this is much ado about nothing. Even if you’re not the fact-resistant type, the temptation to abdicate responsibility and hope politicians will “fix the system” is as tempting as it is delusional. The system we live under was built by people who want it to work this way. To those in control, it’s not broken. It may not work for you, but it works for them. And you work for them. The only hope we have for change is to do it ourselves.

The U.S. regime is the alpha dog of mass surveillance, mass incarceration, and mass media propaganda. But all governments aspire toward ever greater control over their populations. China, Russia, England, all of them. The bigger the government, the more they squeeze. It’s just a matter of money, manpower, time, and technology. Smaller countries are often laughably ham-fisted in their approach, like making it a crime to insult politicians.

Big-Ass Disclaimer

Perfect security does not exist in digital or physical life. A house has a continuum of steps you can take to secure it, but it will never be secure from a determined adversary. A lock on your door is better than nothing, but most locks can be defeated in seconds by people who are trained. Even if you have great locks, what about the door itself? Can it be kicked in? What about your windows? Anybody can break a window. Alarms are useful, but they have several vulnerabilities. Plus they don’t actually keep people out of your home. (By the way, your home is now see-through to the government.)

Just as perfect home security is impossible, there’s no such thing as perfect digital security. No matter how many precautions you take, there are too many “known unknowns” you can’t protect against. Software like your operating system, drivers, and web browser have faults which get exploited. Some of those faults are honest human error, and some are purposely engineered to weaken your security. Those who pretend to protect you are leading the charge to purposely undermine the security of products we rely on.

Now that the Internet is regulated – meaning, controlled – by the government like a utility, things will only get worse.

The very hardware you use – computer chips, routers, hard drives – also have exploits which you can do nothing about. The CEO of Intel refused to answer, with good reason, a question about whether Intel places “backdoors” in its chips. The biggest tech companies in the world are American, and they must comply with orders in the name of national security while being gagged from disclosing said orders.

Bottom line: America’s tech giants are surveillance proxies for the government. The government is also typically their biggest customer. This is the essence of the military-industrial complex.

We almost never hear about it because to say something is a death wish, but corporations also employ NOCs (non-official covers) who carry out government directives.

Modern computers have become so complex it’s practically impossible to know everything that’s happening “under the hood.” Even TVs can record you, translate your speech to text, and beam it to third parties. Computer chips the size of a dime and cheaper than a Big Mac can do all that and more. Really just about any electronics device in range of a wifi signal can be reconfigured into a surveillance device. That includes seemingly innocuous things, like a keyboard or USB thumb drive.

I’m not trying to dishearten you. It’s better to see things as they really are than to be ignorant of real risks. The truth is we’re being attacked from all sides.

The only real shining light in all this is the free and open source software (FOSS) movement. Open source means publishing a program’s source code online so that anybody can inspect it, audit it, compile it, and test it. The complete transparency of FOSS stands as our best safeguard against purposeful sabotage of our security.

Our Goal

The way most people use computers and smart phones is equivalent to leaving your doors and windows wide open with a neon COME ON IN! sign blinking in the front yard. We’re going to close the doors and windows, install curtains and quality locks, and toss the sign in the dumpster.

But know that if you’re ever individually targeted by the government as a person of interest (for example a journalist or whistle blower), pretty much everything you do on a computer or phone likely will be in the regime’s hands unless you have extremely specialized skills like Ed Snowden. As he said, “If there is a warrant against you, if the NSA is after you, they are still going to get you.” If you think you may have been individually targeted, run Detekt as a first step to check for malicious software commonly used against journalists and activists.

The goal of this guide is not anonymity. Anonymity is not possible because it requires control of many factors that are simply beyond our control. Our goal – Snowden’s plea to us all – is to stop the dragnet collect-it-all recording of our lives. As peaceful outlaws living in a mass surveillance world, the most effective act of self-preservation we can take is to render the greatest weapon of oppression inoperable.

If you don’t act, there will have been no real point in reading this. You’ll probably sleep less soundly, and mass surveillance will continue metastasizing. The reality is that to not take action is to enable mass surveillance. And remain highly vulnerable to hackers, stalkers, and fraudsters – threats which seem hypothetical until you get humiliated,blackmailed, stalked, or ruined.

Wednesday, September 16, 2015

Big Brother Surveillance Threat, Part 1: Government Closing the Loop


Big Brother Surveillance Threat, Part 1: Government Closing the Loop


This is Part One, of a series that Urban Survival Skills is calling "Big Brother Surveillance Threat" and is publishing, that are excerpts from a huge article titled "You Are a Criminal In a Mass Surveillance World – Here’s How Not To Get Caught", but David Montgomery and posted on Prepared Gun Owners.com
[http://preparedgunowners.com/2015/06/11/you-are-a-criminal-in-a-mass-surveillance-world-heres-how-not-to-get-caught/]

A Noose Around Our Necks

Mass surveillance equals perpetual uncertainty. No matter how honest and benevolent you consider the current American government, no one knows what laws a future regime will impose. Otto Frank never would have disclosed his family’s religion had he known it would lead to the murder of his loved ones a decade later. His family would have fled Germany and attempted to illegally immigrate elsewhere, as millions have done throughout history.

Living under mass surveillance is living with a noose around your neck. You can’t know what circumstances will cause you to hang. History is loaded with never-saw-that-coming catastrophes. The 20th century alone is an inconceivable horror – 262 million corpses engulfed in various government wars and genocides. That’s equivalent to every single adult living in America today suddenly perishing.

All the nightmare regimes of the past that kids study in school predate the era of computerized mass surveillance. The ability to lock down people’s lives instantly… to track them, analyze them, trap them, financially paralyze them, impersonate them, frame them, and apprehend them is unprecedented. Governments always seek to control the governed, but mass surveillance is the most powerful weapon of control ever devised. Because of its novelty, invisibility, and deep complexity, many people can’t comprehend its implications and therefore don’t defend against it.

Why You’re a Criminal

We unknowingly commit crimes, including felonies, in our day to day lives. The fact that we haven’t been caught is a matter of detection – namely, surveillance. As mass surveillance expands, the government’s crime detection capabilities increase exponentially.

“There is no one in the United States over the age of 18 who cannot be indicted for some federal crime. That is not an exaggeration.” This warning is from John Baker, a retired law professor who tried in vain to count new federal crimes created in just the past few years. The same message comes from attorney Harvey Silverglate in his book Three Felonies a Day: How the Feds Target the Innocent.

Because politicians have made us criminals, what the government knows about you can cost you your freedom. Understanding that is so important that you shouldn’t take anybody’s word for it. See for yourself.

Into the Abyss

Most federal law is aggregated into the United States Code (USC) and theCode of Federal Regulations (CFR). Let’s start with the CFR. Go here, select a year from the menu, and click Go. A list of 50 Titles will appear (2015 is incomplete). Click on the Text link for any Title and start reading. You’ll see that some Titles have several volumes. For example, here’s Volume 1 of the 2014 Banks & Banking code, the first of ten volumes for that year alone.

If you’re anything like me, after a few minutes your brain will attempt to revolt. Push on and do your best to even vaguely understand what Congress – the lawmakers – demand of Americans. You’re up against literally hundreds of thousands of pages of legalese. Much may not apply to anything you’re currently doing in your life, but finding out what applies to you now and has applied to you in the past is, quite literally, impossible. And with thousands of new rules being created every year, you won’t know when you break new laws in the future either.

Need a breather? Have a laugh with me at the sinister humor of the CFR web site’s slogan: “Keeping America Informed.” How many Americans have even heard of the CFR, much less read a single sentence of its laws? What could possibly better illustrate the essence of propaganda double-talk than this slogan? When you tap out on the CFR, give the USC a browse.

But wait, there’s more. Thousands of pages more. The IRS Code is over 7,500 pages and 3.4 million words. When the IRS decides you’ve done something wrong, you are presumed guilty unless you manage to prove yourself innocent. Anyone who’s dealt with the IRS knows that the process is its own punishment. Now that tax forms are filed electronically, artificial intelligence and data mining increase the power to detect non-compliance exponentially.

You’ve seen it first-hand. The law is truly unknowable to the governed. Being a law-abiding citizen is a myth.

Of course this is just federal law. Any adult can be prosecuted for a federal crime, but what about state crimes? State law is another incomprehensible morass – tens of thousands of pages of legalese per state. Cross an invisible line and the same act may no longer be a crime – or it may have twice the penalty. Wade into California’s legal code for a sample, or look up your own state and see for yourself. The abyss goes even deeper. There are thousands of county and municipal laws too.

Catch-22

This demonstration wasn’t meant to depress you. Truth just sucks sometimes. In this case ignorance is anything but bliss.

Every single day ignorance of the law costs people their savings and their freedom. And here’s the awful Catch-22: Ignorance of the law is no defense, even though it’s literally impossible to comprehend what the government demands from us.

Good people everywhere have been turned into peaceful outlaws by politicians.

We live our lives trapped in a ubiquitous but invisible scaffolding of rules. There is literally no aspect of our lives not subject to politicians’ orders.Everything that’s not forbidden requires government permission. What kind of society is this?

Crime Detection Is the Killer App

As criminals we already have a noose around our necks. Crime detection is the terrorizing question that hangs over us. That millions of Americans are behind bars makes one thing clear: The government is zealous about enforcement. New prisons are being built every day. Prosecution isn’t a constraint either since only a handful of cases see a trial.

Crime detection is law enforcement’s biggest bottleneck, and that’s where Collect-It-All surveillance changes everything. Police already track you bywide-area surveillance, thousands of networked street-level cameras, auto-scanning license plates, drones, and spy planes, but that is primitive compared to what’s coming.

Computerized face recognition is already extremely accurate and fast. You can be matched against a nationwide database instantly. This technology will be integrated with the body cameras police now wear. You will be cataloged and tracked by your Universal Control Number (UCN). Yes, that’s really what it’s called. A friend of mine is an Auschwitz survivor. You can still read the “control number” tattooed on his arm.

Military contractor Lockheed Martin has for years been designing biometric surveillance systems to track us by our hand prints, face, voice, and walking gait. Their use for crime detection is unlimited. Anything that can be electronically measured can be the basis for automated crime detection. For example fingerprints can now reveal drug use.

Going forward mass surveillance will be combined with robotics to create law enforcers who will automatically scan and crime check you. The military-industrial complex is leading robotics development. As with bug-sized drones and MRAPs, the technology and equipment will cross-pollinate with domestic law enforcement.

Hopefully this glimpse of what’s coming makes it clear. Mass surveillance isn’t about having nothing to hide. It’s about hiding whatever we can.

Mass Surveillance Cheerleaders

The highest profile shills for mass surveillance are the usual suspects: politicians and mega-corporation execs who have the most to gain. Former U.S. Senate majority leader Trent Lott: “What are people worried about? What is the problem? Are you doing something you’re not supposed to?”

Google chief hypocrite Eric Schmidt defines privacy as an excuse to hide wrongdoing: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”

Google employs many brilliant people who no doubt mean well, but the simple truth is this: Google’s business is, literally, mass surveillance. Snowden revealed the NSA has direct access to Google’s servers. Google’s vast offering of services equals the world’s biggest surveillance roach motel. There’s a reason the room and board are free. You’re the product, not the customer.

The Death Star Is in Utah

Mass surveillance is not only Collect-It-All recording of your life. The totalitarian power of mass surveillance comes into focus when one sees how years of data can be summoned in the future for purposes you can’t predict. Five or ten years from now your surveillance records could be used as the basis for advanced interrogation, criminal prosecution, bail-ins, property confiscation, blackmail, stalking, humiliation, horrific medical procedures,internment camp, deportation, and yes, even execution. None of these is without historical precedent.

The technology enabling Collect-It-All surveillance perhaps seems vague since we don’t have any practical reference for what it takes to implement. Here’s a glimpse.

Snowden’s revelation of the Collect-It-All blueprint was the prelude to the completion of a 1.5 million square foot complex called the Utah Data Center. The original name of the complex – Massive Data Repository – is more ominously instructive.

Imagine a stadium-sized complex filled with the world’s fastest super computers and endless racks of digital storage space so vast that you literally can’t comprehend how much information can be stored. The power and cooling required for the complex is staggering. It consumes 1.7 million gallons of water daily to operate. This is the mass surveillance equivalent of the Death Star. Last year it went fully operational.

The difference between filing cabinets and the space-age technology of the Utah Data Center is almost impossible to describe. In terms of speed, it’s like comparing a tricycle with a supersonic jet. In terms of search power, it’s like a magnifying glass versus the Hubble telescope. In terms of data storage, it’s like a hot tub versus Lake Michigan. And yet, it’s worse.

Weaponized Data Mining

There simply is no comparison to be made in the pre-digital era when it comes to data mining – using the power of computers to find patterns across vast quantities of data. The Utah Data Center is weaponized data mining.

Collect-It-All surveillance means that if the government wants to target you, it can comb back through years of your life in minute detail. As we’ll see shortly, coming up with a crime in order to prosecute you is easy. There are so many laws in existence today that legal experts agree that anybody can be prosecuted for crimes they aren’t aware they’ve committed.

Even if you didn’t commit the crime you’re being prosecuted for, mass surveillance guarantees that innocents will be targeted because data mining can’t tell whether a pattern is intentional or coincidental. Say there’s an enemy of the government being tracked by the feds. You coincidentally are on the same flight sitting next to him, use the same car service, stay in an adjacent room at the same hotel, eat at the same restaurant, and then take the same flight the next day to another city. Now you too are a target. If you happen to also be Muslim (1% of the U.S. population), good luck.

U.S. law is clear on what might happen next. Perhaps men show up and interrogate you. Or they secretly tear apart your life down to the smallest detail looking for any charge to pin on you. Maybe they destroy your reputation and monitor how you respond. Or maybe you get disappeared. Under the NDAA, American citizens can legally be kidnapped, imprisoned in secret without charges or access to a lawyer (indefinite detention), andsubjected to torture programs developed by doctors.

The Torture Triumvirate

To design the US government’s torture program taxpayers paid over $81 million to Dr. James Mitchell and Dr. Bruce Jessen and another $31 million to Dr. Martin Seligman, former president of the American Psychological Association. Seligman is a man who achieved fame by repeatedly shocking dogs until they completely gave up trying to avoid the shock, even when presented with the opportunity to do so. This state of hopeless surrender is what he coined “learned helplessness.”

These three were not paid $112 million to suggest sleep deprivation or waterboarding (both of which have been used for centuries.) The public has no clue what the real torture program is. But given the government’s history of using drugs to torment people, I suspect drugs are the holy grail of modern torture as they break no bones and leave no scars. Imagine being inflicted with a drug-induced migraine and then getting locked in a cell withblasting heavy metal and flashing strobe lights. What would you say to make it stop? Centuries ago you’d confess to being a witch.

Death From the Sky? Legal.

If being kidnapped, caged and tortured without trial isn’t sufficient for the government’s purposes, the president also claims legal authority to summarily execute US citizens. Four Americans, including a 16-year old boy, have already been executed by drone strike – no charges levied, no trials, no evidence presented, no opportunity for defense. Just sudden death from the sky.

If you think “kill lists” are only about Muslims and therefore don’t affect you, count yourself among Germans in the early years of the Nazi regime who said these laws are unfortunate but only affect a few Jews. By the time the general public felt things were really getting out of hand, to speak out was to risk your own life. So let me repeat: The government has granted itself legal authority to summarily execute American citizens. Just because you’re not a target, don’t delude yourself. This is turnkey tyranny.

The data mining power of the Utah Data Center will find all sorts of extremely unlikely coincidences which will be used to cage or kill innocent people. The old way to do that was to torture people into making false confessions, frame them with planted evidence, or convict them based onfaked forensic science. With weaponized data mining, no fabrication will be required to put innocent people away.

Much like the IRS process of finding you guilty unless you can prove your innocence, you’ll be in the crosshairs trying to explain an extraordinarily unlikely coincidence. A one-in-a-million coincidence is common when the world’s fastest supercomputers are searching for patterns among quadrillions (that’s thousands of trillions) of pieces of data. Trying to establish your innocence will be like trying to prove a negative.

Mass surveillance is ushering in a brave new world of crime detection. The vast majority of crimes in the past have gone undetected. A Collect-It-All mass surveillance apparatus is an all-seeing eye which untethers crime detection from manpower constraints.

Law Is Codified Hypocrisy

My definition of a bad guy is a person who purposely harms or threatens to harm others or their property. I used to think of crime as the stuff that bad guys do. Bad guys are criminals, and criminals are bad guys. Makes sense, right? After all murder is a crime. Theft is a crime. Assault is a crime.

Cartoons, TV shows, and movies I’ve seen from childhood have reinforced the only-bad-guys-do-crime message. And my teachers were explicit: Good people obey the law. Be a law-abiding citizen.

Yet millions of Americans who are not bad guys have criminal records.

My day in the Secret Annex taught me that it’s a trap to equate crime with morality. While I think it’s always preferable not to harm people or their property, neither my nor your preferences should be conflated with laws. That’s because most laws have nothing to do with actually harming others or or their property. Sure there are plenty of bad guys who are criminals, but there are also millions of Americans who have been convicted of victimless crimes. They simply broke a politician’s rule, often unknowingly.

Meanwhile many bad guys aren’t criminals because the law doesn’t apply to them. Every day peaceful people and their property are harmed by government employees acting in a fully legal capacity. That’s because those who govern us are permitted to do the very things the governed are forbidden from doing.

If you are carrying out government orders:


•Legally maiming and killing thousands of people who haven’t harmed anyone isn’t mass murder. It’s collateral damage.

•Legally caging a person for inhaling something the government doesn’t approve of isn’t kidnapping. It’s corrections.

•Legally siphoning all the money out of someone’s account isn’t theft. It’s asset forfeiture.

Legally blockading a country from receiving desperately needed goods and services isn’t economic warfare. It’s foreign policy. (Don’t forget, the dead children are collateral damage.)

•Legally using insider information to rack up stock market profits isn’t insider trading. It’s Congressional investing.

•Legally transferring hundreds of billions to Federal Reserve banking cartel cronies isn’t fascist economics. It’s quantitative easing for your financial security.

•Legally forcing interest rates to zero so that savers lose purchasing power and banks clean up isn’t price fixing. It’s monetary policy.

•Legally spending trillions to create the most militarized society in history isn’t totalitarian insanity. It’s defense.

•Legally demanding your money under threat of imprisonment to pay for all these things isn’t extortion. It’s taxation.

What is criminal for the governed is legal for the government.

(If you’re a government employee or contractor, thank you for being open-minded enough to read this. When one’s salary depends on believing something, considering other perspectives is as difficult as it is rare.)



Thursday, September 10, 2015

Planning Rehearsals



I received this e-mail from "John":

"Urbanman, like your info. me and my friends discuss prepping all the time. We have five of us in our hunting and survival group, but of course we expect to have all sorts of relatives bust our group when the time comes.

That's cool, because we're ready for it. We have a farmhouse belonging to one of guy's grandmas about a mile and half out of town. That's are meeting point and security point. We plan on staying here as long as we can maybe forever because we have woods and two water ponds. After we hunt or shoot we have a practice of discussing scenarios.

The last one was two weeks after SHTF. If we go into town to see what is going on, or maybe look at a couple of spots where solar panels. It's a no brainer if we have cell phone service, but may not so we may have to go into town to look around and see what's available plus the solar panels would come in handy. What do you think? Call me John if you write this."

UrbanMan replies: John, thanks for writing. It's a good routine to get into talking about scenarios with your group. It can help identify areas where you disagree and need to come to a resolution about plans and protocols. It can also help identify equipment, material and even skill sets gaps that can be fixed before you are doing it for real.

This game of "what if'ing" is called war gaming If you were leaving your secure site to conduct a patrol into town, you would need to have clear cut objectives,...a mission if you will. Such as making contact with selected town residents to get an situational update; procure any needed items, especially food and fuel. And even if you are only going 1.5 miles, you need to plan at least the primary route using the terrain to your advantage for cover and concealment.

Some considerations for your patrol planning checklist, be it the scenario into town or a longer security or forage type patrols:

Control: Sometimes simplicity is the key to controlling a patrol and the actions. Standard Operating Procedures (SOPs) for patrolling, arms and hand signals, reaction drills, crossing danger areas, and more, helps the patrol operate as one team and make control easier.

Security: During a patrol, security is achieved through choosing routes that provide cover and concealment, especially on approach to the target or the tentative observation/listening post. Good employment of light, noise and litter discipline also helps the patrol stay undetected.

Communications: This covers radio communications to visual signals. Consider recognition signals and distress or duress signals, and code words. Use brevity codes for radio communications. Have scheduled communications contacts or windows, however even at only a mile and a half, FRS/GMRS type radios will not have the range.

PlanningThink contingencies,...contingencies,.....contingencies,...use PACE planning. Ensure everyone, even the guys remaining, know all contingency plans,...situations like if the patrol is ambushed or the secure site is attacked.....where you emergency rally point is,....this list is endless but needs to be considered so the patrol operates with backup plans.

As far as the solar panels. I am not advocating conspiracy to commit theft, but in a very decayed world without law enforcement or order of any type, I too would consider "requisitioning" available solar panels to hook into my home power grid.

Urban Man

Friday, September 4, 2015

EMP Threat Scenario





Here is a good short video on the dangers that the US is facing from a possible and likely EMP scenario. If our country does not get its act together and protect its citizens, we may be facing this one day.

Urban Man.

Tuesday, September 1, 2015

Chapter 30- Coping Without Running Water



Every Prepper worth their salt stores water and lots of it.  Not only that, they store one, two, three or more ways to purify water.  That is all well and good because you never know when a disaster or other disruptive event may occur and those water resources will be called upon for drinking, cleaning, hygiene, and sanitation purposes.

Recently, my number came up and I was the one without water during a short term, personal water apocalypse.  Now really, that may be a bit dramatic because I was simply without running water. This was caused by a break in the line from the water main at the street to my home.  All told, I was without running water for 12 days.

To be honest, I was quite relaxed about the ordeal.  After all, I had cases of bottled water for drinking, and a 55 gallon water barrel holding purified water.

Still, being without running water brought up issues I had not considered. Albeit water-ready, the reality of not being able to turn on the tap and have fresh, and especially hot, water was a new experience.

Today I learned more tips from Urban Man for coping without running water so that you can be better prepared if something similar happens to you. Below are 17 tips to help in this situation.

17 Tips for Coping Without Water:

1. With advance notice of a water shutoff, fill the bathtub and as many spare jugs and buckets as you can round up. In addition, fill the Berkey, if you have one and all of your sinks.

2. Double up on hand sanitation.  Fill a spray bottle with liquid castile soap, water, and a copious amount of tea tree or other anti-bacterial essential oil. To wash you hands, spray with a generous amount of your soap/tea tree mixture then rinse with water from a filled sink or a container of water set next to the sink.  Follow-up with commercial hand sanitizer.

3. Know the location of your preps!  In my case, I had two camp showers that could have been used for taking hot showers after heating water on the stove.  Could I find them?  Nope.

4. No mater how many buckets you have, you need more.  In addition, make sure the buckets you have are manageable, weight wise, when filled with water.  Remember, water weighs 8.35 pounds per gallon.  My buckets were re-purposed 2-pound buckets obtained for free from a local cafe and were small enough for me to handle comfortably when filled.  A water filled 5 gallon bucket would have been a problem.

5. When using the toilet, flush liquids daily but solids upon each use.  I had two toilets in use so it was easy to abide by this formula.  I did not, however, flush TP (see below).

6. Dispose of toilet paper into a wastebasket and not into the toilet.  This will prevent your toilet from backing up because it is crammed with paper!  Been there, done that.  Do, however, be mindful of the smell and dispose of the contents of your wastebasket daily.  Baking soda helps control odors if you can not dispose of soiled TP often enough.

7. When it comes time to flush, fill the tank with water and use the handle on the toilet to flush.  This uses less water than dumping water into the bowl.

8. Stock up on disposable plates, cups, and eating utensils.  Cleaning up after meals will be a challenge and will use a lot of water.  Save the water you have for cooking utensils and use disposables for everything else.

9. Clean with cloths and rags not sponges.  Without proper cleaning, sponges will become very unsanitary quickly.  Gross even.  Use microfiber cloths or cleaning rags made from discarded tee shirts or towels.  They can be washed using a Mobile Washer, tossed in the garbage, or laundered when things return to normal.

10. Learn to take “sponge baths” using a washcloth and soap.  Your spray bottle of castile soap will come in handy for this.  Better yet, lay in a supply of No-Rinse Bath Wipes (my favorite), homemade wipes (something I still need to learn to do), or baby wipes.

11. Have at least one way to filter and purify watered gathered from the outdoors.  See How to Use Pool Shock to Purify Water.

12. Learn to hook a hose up to your water heater so that you can use its water in an emergency.  It is a good idea to turn off the electrical breaker or turn off the pilot light first.

13.  Plumbers may not always be available so learn minor plumbing repairs yourself.  When the water came back on, one of our toilets failed, probably due to the back flow of gunk.  Repairs were easy with a backup tank repair kit.

14. Get to know which neighbors have what home repair and handyman skills.  Let them know about your own skill-set so that there is reciprocity and you can help each other out when something goes wrong and needs fixing.  Everyone knows how to do something, right?

15. Keep basic tools on hand, including shovels, axes, saws, hatchets, and other manly-man items.  Just because you are a woman does not mean you should not have basic tools!

16. Maintain a good sense of humor. Treat the experience and a learning experience as well as a grand adventure in self-reliance.

17. Purchase 30 gallon and 55 gallon water barrels for storing water at your home. I would recommend a minimum of 4. Learn to check and keep the water purified. Rotate water every 4 months by using the water to water your survival garden and yard, wash your car, etc. Purchase hand pumps to make removing the water easy.

The Final Word

Regardless of how much you drill for disruptive events, having something happen for real will open your eyes to considerations that were unplanned.  With camping, backpacking, and boating, you know in advance you will not have running water and can plan accordingly.

No running water at the drop of a hat is another story completely.

Wednesday, August 26, 2015

Maggots Use In Medicine

Ancient therapy making comeback as wound-healing option

These aren't your grandfather's maggots.

Maggot, or larval, therapy has been around since ancient times as a way to heal wounds. Now, the method has gone high-tech--in some ways--and it's being tested in a rigorous clinical trial at the Malcom Randall Veterans Affairs (VA) Medical Center in Gainesville, Fla. Recruitment is now underway.

The study involves veterans with chronic diabetic ulcers on their feet. The maggots feasting on the dead or dying tissue in their wounds--and eating germs in the process--have been sterilized in a pristine, pharmaceutical-grade lab. Instead of roaming free over the wounds, they are contained in fine mesh bags, and removed after a few days.

Welcome to maggot therapy, 2015.

"There's an eight-step quality-control process to how these medicinal maggots are produced," notes lead investigator Dr. Linda Cowan. "Every batch is quality-tested."

Cowan has a Ph.D. in nursing science and is a wound-care specialist with VA and the University of Florida. She has studied maggots in the lab, combed through the available research on them, and seen firsthand what they can do in wounds.

"As a clinician, I was very impressed by the literature on larval therapy. And sometimes we would have patients come into the clinic with what I call 'free range' maggots--they're not sterile, they're not produced specifically for medicinal purposes--the patients got them at home, unintentionally. But they really clean out the wound nicely."

Cowan, like other researchers, tends to prefer the scientific term "larvae" over "maggots," but they mean the same thing. The whitish worm-like creatures are young flies, before they mature into pupa and then into adults. For therapy, in most countries, the green bottle fly is the insect of choice.

Co-investigator Dr. Micah Flores, whose background is in entomology--the study of bugs--admits that "maggot" does have a negative connotation for most folks. "It can be a scary word," he says.

Cowan points out that in the study's recruitment flyer "we use the term 'medicinal maggots.' We want people to know these are not home-grown on somebody's windowsill."

The VA study will involve up to 128 Veterans. It's comparing maggot therapy with the standard of care for diabetic wounds--a treatment called sharp debridement, in which a health care provider uses a scalpel, scissors, or other tool to cut or scrape away dead or unhealthy tissue. The procedure promotes wound healing.

Nearly a quarter of VA patients have diabetes, and about a quarter of these will have foot wounds related to the disease. In many cases, the hard-to-heal ulcers worsen to the point where gangrene develops and amputation is required.

The Gainesville researchers will examine how well the wounds heal in each study group. They'll also look at maggots' effects on harmful bacteria. In addition to clearing out dead tissue, maggots disinfect wounds by ingesting bacteria and secreting germ-killing molecules. They also eat through biofilm--a slimy mix of micro-organisms found on chronic wounds.

Turn back the clock about 90 years, and there was a researcher who grew maggots on a hospital windowsill, as unscientific as that sounds. Dr. William Baer had treated U.S. soldiers in France during World War I and noticed that large, gaping wounds that were swarming with maggots--sometimes thousands of the creatures--didn't get infected, and the men survived.

Baer came back to Johns Hopkins University and experimented with the therapy, only to realize that maggots could spread disease as they devoured decaying tissue. Two of his patients died of tetanus. He made some progress with using sterilized maggots, but soon antibiotics would come on the scene and maggot therapy--with its high yuck factor--fell into disregard.

"Antibiotics were the new cure-all, and so we didn't need the maggots around too much anymore," says Cowan. "But they've never gone away completely."

A few studies took place in the U.S. in the ladder half of the last century, including some at the VA Medical Center in Long Beach, Calif. But it wasn't enough to place maggots in the pantheon of modern medical miracles. Meanwhile, the therapy continued to attract interest in the United Kingdom, where a game-changer occurred a few years ago. A Wales-based company called BioMonde came out with the bag concept, which caught Cowan's attention right away.

She had been interested in studying maggot therapy. But she also realized that many clinicians, as well as patients--and their caregivers at home, who would have to change dressings--might have a hard time warming up to the idea.

"When we started talking about doing this study," says Cowan, "we were interested in the yuck factor. One of my concerns was other clinicians. They have to deal with this. They may be turned off by what I call the squirmy wormies."

Cowan recalls one nurse colleague who would recoil when patients showed up in the clinic with wounds that had attracted a few maggots.

"She just had an aversion to larvae of any kind. When a patient would come in, and they would have these free-range maggots, she would not want to deal with them. She would come and get me, and I would take care of it.

"I realized she wouldn't be the only clinician out there who would feel like this. So I thought this product would really make a difference."

That said, Cowan believes many patients are undeterred by the insects, bags or no bags. She tells of one veteran who has been struggling with a non-healing diabetic ulcer for three years. "He said he is willing to try anything that might work."

That attitude is not uncommon among those with diabetic sores, says Cowan, although she senses that veterans, as a group, may be a bit less squeamish than the general population, and thus even more receptive to the therapy.

"When we go through the informed consent form with them, we explain the study and we tell them they could be randomized to the 'sharp' group, which is the standard of care, the same kind of debridement they've gotten in the past--or they could get the maggot therapy. We've done about 21 informed consents so far. Overwhelmingly, people have been disappointed if they weren't randomized to the maggot group."

BioMonde, the company sponsoring the trial, has said it will provide maggots for up to two weeks of treatment for any patient who did not receive the therapy during the study but wants it, and whose physician believes it would be appropriate.

Both groups in the study will receive treatment over the course of eight days. Along with studying the veteran patients and their wounds, the researchers will survey their caregivers and clinical providers. "One thing we want to find out," says Cowan, "is whether this yuck factor is really an issue. And who is it the greatest issue for? Patients? Clinicians? The wife or husband who has to change the dressing?"

To examine the main study outcome, the team will photograph each wound before and after each treatment. Then, wound-care experts who are blinded to which therapy was used--maggots or sharp debridement--will visually assess how much viable versus non-viable tissue remains.

Just as important, the team will study the therapies' effects on biofilms. A biofilm is not a movie about someone's life--it's a soupy mix of bacteria and other germs that resides on or in a wound. Experts believe it may be part of why some wounds--such as diabetic ulcers--are so difficult to heal. Cowan's group has studied biofilms in the lab, grown on pieces of pig skin, and she says the maggots are the only therapy that appears to completely eradicate them.

"A biofilm is a party of poly-microbial organisms," explains Cowan. "It could be bacteria, fungus, virus--all of them. They spit out a protective coating that protects them from things you would put on the wound, like an antiseptic gel. Also, it protects them from things you might take inside the body systemically, like antibiotics. So it's tough to get rid of these biofilms.

"You can debride with a scalpel, and you can cut away what looks like dead or unhealthy tissue, but you can't see biofilm. And if you don't completely get rid of a biofilm growth, within 24 to 72 hours it can completely regenerate, with its protective coating."

Cowan collaborated with Dr. Gregory Schultz on numerous studies involving biofilms at UF's Institute for Wound Research.

"Both independently and collaboratively, we tested quite a number of products," says Cowan. "We tried all kinds of expensive things. There were some that were more promising than others. We would get some good, favorable results. But there was nothing that was getting rid of everything--until we tested the maggots."

The group published a 2013 study in the journal Ulcers that included before-and-after pictures, taken with an electron scanning microscope, attesting to the maggots' handiwork.

"The results were mind-blowing," says Cowan. "The photos show the difference with the larvae at 24 and 48 hours. At 24 hours there were hardly any [bacteria] to count, and at 48 hours the biofilm was completely gone. Not one organism left."

She points out another benefit of the maggots, versus drug treatment: "It's hard for bacteria or other organisms to develop a resistance to something that's going to eat them." Drug-resistant bacteria are a huge problem in U.S. heath care.

Flores, the entomologist, wants to peek inside the maggots, to see what they've ingested. After they are removed from a wound, the bagged maggots are being frozen for later analysis. (Not in the same freezer where the lab crew keeps their Haagen-Dazs, by the way.)

"My background is studying insects--flies in particular," says Flores. "So I'm very interested in what's inside the larval gut, what they've been feeding on. Are they picking up the same organisms we're seeing growing on the wound? Does it match up?"

Flores and Cowan say theirs is the first study to do this type of analysis. And there should be plenty to look at: Between dead tissue, bacteria, and biofilm--an all-you-can-eat buffet for maggots--they take in enough grub to noticeably blow up in size.

"They do a great job," says Cowan. "They plump up to the size of a small jelly bean, whereas when they go in, they're smaller than a grain of rice. So it's pretty impressive."

The team is also looking at biomarkers of wound healing as another study outcome. Enzymes known as MMPs, for example, rise in response to inflammation. Levels drop as a wound heals.

Pending the study results, Cowan hopes to see maggot therapy catch on in the U.S. as an evidence-based way to treat wounds--not just diabetic ulcers, but other types as well. One example might be deep skin wounds in combat veterans. She's already gotten calls from plastic surgeons interested in the therapy.

"If the maggots can clean up a wound, they can possibly make advanced therapies more effective so you don't have to repeat them. For example, if you take a skin graft from the leg and put it on the belly, if that wound has a chronic biofilm, that graft is not going to take. But if you clean it up and then do the skin graft, it may take. What a win-win that would be."

[Source: EurekAlert, The Global Source for Science News, 17 August 2015
http://www.eurekalert.org/pub_releases/2015-08/varc-mim081715.php]

"Comment:  I found this article to be very interesting. I have heard of this being done before and see it in a lot movies. This is some good information to retain, as I have a feeling we may be needing to use it in the future." 

Urban Man~


Thursday, August 20, 2015

Are You Scared? I am!




This is an article by Bob Rinear and it hit a note with me as I can't help but have this feeling of dread. Other people that I talk to have it as well. Whether it's an investor thinking the stock market will collapse or it some parent who think there will be a great depression and he won't be able to feed his family, or it may be a parent who thinks there will be a total collapse and medicine for his diabetic son won't be available.

Whatever it is, I am heeding it as I have long ago learned to respect my gut instincts. It may be all that keeps you alive in the coming chaos.

Are you Scare? by Bob Rinear

When I talk to people that I consider to be “awake” they all tend to say the same things to me. Almost to a tee, they suggest that they feel something isn’t quite right, but they don’t know exactly what.

They feel like things are out of control, but can’t say why. They feel there’s some form of impending doom, but can’t explain what it is, or why they even feel that way. They just know things aren’t right,but for the life of them, they can’t elucidate just why they feel that way.

I understand that feeling and it is real. You know it in your mind, you almost feel it in your gut. It’s not just the rioting, it’s not just the crazy things like Jade Helm, it’s not just the soggy economy, it’s not just the loss of morals, it’s not just the mindless souls staring like zombies at their cell phones, it’s not just the insane Political Correctness, it’s not just the laws for the privileged versus the laws for the masses, it’s not just any one thing. It’s a combo platter of all of that and considerably more. In a word, many of you are “worried” and I think rightfully so. You just hide it well.

The old analogy is “whistling past the graveyard”. Popular in the 30’s, its definition is “To attempt to stay cheerful in a dire situation; to proceed with a task, ignoring an upcoming hazard, hoping for a good outcome.” I remember quite well using an example of whistling past the graveyard when I was a youngster. I was 12 years old and my neighbor Matt and I had walked to the movies to see a show. Slated to end at 9 pm, the theater was just half a mile from our house and back then kids could walk home safely in the dark.

After our movie was over, the theater announced that they were going to run a “sneak preview showing” of a brand new movie called “night of the living dead”. It was a Saturday evening and Matt and I phoned home quickly to see if we could stay and watch the “free” movie. We got the okay.

If you’re not familiar with the film, it’s about a group of folks that find refuge in a farm house after the population had been turned into flesh eating zombies. Well, it scared the Bejesus out of the both of us. On the way home, we had to take one short path through some woods, and we did our version of whistling past the graveyard by talking really loud to each other and making fun of the ghouls because they were so fake. Truth is we were scared witless and awful glad to get home.

I see a lot of whistling past the graveyard. You ask folks “hey, how are you doing” and they respond, “oh fine, thanks” but then later you find things aren’t so fine. They’re behind on their mortgage, the kids can’t find jobs, medical is eating them alive, etc etc. Every story is different, but similar. They aren’t fine in the classic sense that we all used to be. They’re whistling.

I wanted to write this to let you know, you’re not alone. If you have that feeling that things aren’t right, and you’re concerned about the future, you’re in fine company. You have every reason to feel that way because indeed there’s so many things going on that it becomes overwhelming. Let’s face it folks, the three biggest selling drugs in America are anti-depressants, anti-acids, and Erectile dysfunction medicine. That alone should give you a good insight into the stress of modern day living.

I think the key to remaining sane in this modern world is picking your battles. You can’t fight everything. If you’ve got one pet peeve chewing on you, then go after it with gusto. Maybe you can join forces with other folks bothered by the same topic, and get something done about it. But don’t try and take on all the ills, it will drive you crazy, exhaust you and make you miserable.

People often ask me why I don’t talk about such things as Ferguson or Baltimore. Why I usually don’t comment on the gay movement, or the lesser number of Christians in the past ten years. Well the fact is I have very strong opinions on such things, and many more to boot. When I see a child get expelled for chewing a pop tart into a “gun shape” don’t you think my head explodes? It most certainly does. I think the loss of common sense in America is one of the things that bothers me more than anything else. Where the hell did it go??? When I see the loss of Freedom’s we’ve experienced, it saddens me to the core.

But again, you can’t fight everything. We try our best to tell you what’s happening in global finance, who the elites are, what their angling towards and how best we can profit or protect ourselves from them. That battle alone is all consuming as far as time and energy goes. Why? Because what happens at the upper end of elitist banking will trickle down and affect virtually every aspect of your life.

From taxes, to interest rates, to employment opportunity, to wars, to politicians, to you name it. I have enough battle on my hands, that’s for sure.

I’d love to tell you it’s all going to get better, but alas, I cannot. Each day gets more bizarre than the next. The worst part is that from where I sit, most of it stems from the financial side of the story. The struggle going on globally to deal with a quadrillion in derivatives, and dozens of completely broke nations, tends to toss normality out the window in a big way. Governments can ram all sorts of things
down your throat when you’re more worried about your paycheck than keeping an eye on their criminal activity.

Just consider the abject insanity of this…on Wednesday we had the worst retail sales report since 2009. On Thursday the WSJ reported that we have just come through the worst month of economic reports since the great recession. So what did the market do Thursday? It ran to a new alltime high on the S&P. Are markets supposed to soar to new highs on economic reports this bad? No.

But in 2015 they do, because the market is broken. It’s all about Central planners, central bakers, Wall Street wizards. It’s all about selling debt to buy back stock, it’s about the Swiss National bank owning billions upon billions of US stocks.
You’re right to be confused, concerned and at times mad. The world has been turned upside down.

College costs more than my first house. Race relations are at an all time low. Despite the war on drugs and the war on poverty, we have more of both in huge supply. Civility is gone. Road rage is the norm. The police are being militarized, and scary joint exercises are being played out in 20 states.

The price of protein is out of sight, and chicken, and burger has hit yet another all time high. Seafood has become completely out of the question for tens of millions. I could go on for ages.

My point isn’t to be an “angry white guy” as I was called recently. Hell I keep collecting nicknames all the time. I’ve been Negative Nancy, an angry white guy, and that conspiracy nut Bob just in the past month. My point is simply to say to you all, it’s real. What you’re feeling is legit. Something is coming and only your imagination will limit what it could be. How do I know something’s coming?

Because we cannot keep spinning ever more out of control for ever. Something’s got to give.

I don’t know how we fix inner cities, I really don’t. I don’t know how we get politicians that don’t lie to us. I don’t know how to fix a justice system that has one set of laws for the Hollywood and rich, and another set for us peon’s. I don’t know how to get common sense back. I don’t know how to defeat political correctness. I simply have a feeling that it all has to play itself out, burn itself out.

And I think the spark that lights the fire is some form of economic reset. Something pretty big that shakes us to the core for a while and we collectively wake up and decide we’ve been going down the wrong path for too long and it’s time to rebuild. Empires that begin to lose control don’t tend to fix themselves and return to what made them great, they tend to be faced with something major that forces them to change. War, bankruptcy, revolt, etc. I think we’re on that path. And yes it hurts to say that.

So no, you’re not crazy and things are indeed strange and getting stranger. Everyone’s whistling past the graveyard. Something’s coming and it’s my job to try my best to figure out what it is, and how we can get around it. So far the only thing that makes the most sense to me is a global economic reset, and the disruptions something like that will bring. Maybe I’m wrong and imagining all this…but I don’t think so.

If you’ve been with us for any length of time, you know that the thrust of most of my articles is “what can we do about it?” It’s one thing to rant and rave about all the lunacy we see each day, but it’s something else to try and lay out real plans to deal with it. Well I tend to think that it always starts at “home”. All you can do is make your family the best it can be. That’s financially, educationally, defensively, etc. You’re not going to alter the tides of societal change. All you can do is alter
yourselves. Once your situation at home is as good as you can make it, can you then reach out and try and “fix” other things.

Let me leave you with this thought. The President is working on his pet trade agreement. So secretive is the content of that agreement, that word is if you’re in Congress and want to see it, you have to meet one on one in a basement office. You cannot take in a cell phone. You are given the pages one section at a time and must be returned after reading while you’re watched. You are then sworn to not discuss what you’ve seen. This is what passes today for our “Government for and by the people”. It’s nothing of the sort. This is Government for and of the elitist corporations and one world thinkers. You simply get in the way.

If your elected officials have to create pacts and agreements in total secrecy and then we have to “pass it to find out what’s in it” the idea of a free Republic is no more.

So you’re right to whistle past the grave yard. You’re right to have that ugly feeling in your gut.

You’re right to think that as much as you hope for the best you fear for the worst lately. In all the years I’ve been writing this, which actually started in 1994, some 21 years ago, I’ve never been as “worried” about our future as I am today. That says a lot because I’ve come through some big things in my life, from Vietnam to 9/11 to the 2008 crash.

95% of all my articles are designed to enlighten you to what we really see going on, and provide some path to profit from it, or protect yourself from it. It’s all I know how to do. Stay tuned.

Urban Man

Saturday, August 15, 2015

The EMP Issue





It's no surprise to reader of UrbanSurvivalSkills.com that I am a big fan of the International Forecaster and especially Bob Rinear. This article reminds us of the potential Electro Magnetic Pulse (EMP) threat. This was brought home to me two days ago after a hellacious thunder storm left us without power and even the cellular system was messed up. An EMP event would make this basically permanent. So hopefully, part of your survival plan address a no warning and immediate grid outage. What are you doing to do?

The EMP Issue, by Bob Rinear, The International Forecaster, Wednesday 5 August 2015
http://the internationalforecaster.com

On Sunday I wrote a piece called “Fear Porn”, and it was the first of two articles I wanted to write for a long time, but “things” got in the way. The first article was about the concept of our entire lives now revolving around “the Internet”, and yet the net isn’t as stable as you might think. As I pointed out, your life would be massively disrupted if indeed a terrorist (foreign or domestic) did a massive hack which brought down the routers and pointers of the nets infrastructure.

Not because you couldn’t look at photo’s of your “BFF” showing you his or her breakfast, not  because you couldn’t tweet about some terribly unimportant topic…but because we are now at a point where no net…means no transactions. No credit cards, no ATM’s, no phones, no hotel reservations, no “a lot of things”. Given enough time, a nationwide Internet shut down, could very well cause social unrest, deaths, food supply problems, you name it. But the fact is, that’s just the warm up for the real issue. What if our power grid goes down?

I laid out the nightmares we saw during the NYC blackout of 1977 and the Ohio/Northeast blackout of 2004. Robberies, fires, arson, break in’s, looting, shootings, you name it. Ugly stuff, and that was just 1 and 2 day outages. What if something took the grid down for months?

Over the years I’ve looked at different situations wherein the “grid” as we call it (electrical generation and distribution) could be compromised on a wide scale. There’s several things that come to mind, such as network hacking. But the two that get the big attention are Solar burst of energy, and EMP’s. So what’s the real deal here? Can these things do what we’ve been told or not? Let’s look…

EMP stands for Electro-magnetic Pulse. An EMP is a short burst of electromagnetic energy.

Such a pulse may occur in the form of a radiated electric or magnetic field or conducted electric current depending on the source, and may be natural or man-made. Okay, so what’s the big deal?

Well, if the EMP is big enough, it will follow power lines, long cables, grounding straps, and burn up things with a power surge. Anything not “hardened’ against a massive short term burst, simply burns out. Be it computers, TV, phones, hospital equipment, power generators, high voltage lines, etc. Bad stuff.

We have been aware of the “natural” EMP’s that come from the Sun ( and even severe lightening storms) because the sun caused such a “burst” of electro-magnetism in 1859 that telegraph operators were singed around the country as sparks lit up their transmission lines.

Aurorae were seen around the world, those in the northern hemisphere as far south as the Caribbean; those over the Rocky Mountains were so bright that their glow awoke gold miners, who began preparing breakfast because they thought it was morning. People in the northeastern US could read a newspaper by theaurora's light. It was named the Carrington Event.

It was (and still is) the largest recorded geomagnetic storm. If something of that magnitude were to hit today, with the incredible amount of electronics we use each and every day, it would fry tens of millions of devices and plunge us into the dark for MONTHS. In fact, in Ontario Canada on March 13th 1989 a solar storm impacted their area. At 2 am on the 13th the Ontario grid went dark, plunging millions of folks into the dark. No power, no phones, no water pumping (electrical pumps) No Natural gas (electrical pumps) etc.

They found the fried equipment and things were up and running in about 12 hours. But think about that for a second. A solar “Coronal mass ejection” knocked out the power to millions. Yet it was “tiny” compared to the Carrinton event. So problem one with EMP’s is that they can indeed be natural, and another like the 1859 version would indeed take down huge parts of our entire countries power grid.

But we found out in 1962 just how dangerous Man made EMP’s could be. During that year, the US Government decided to test a high altitude nuclear blast. The test was named starfish and took place about a thousand miles from Hawaii on a deserted island. When the bomb went off some 250 miles up in the atmosphere, something quite strange happened. Electrical components on the Islands of Hawaii were blowing up. To quote one of the researchers….

The effects were bizarre and almost entirely unanticipated. One effect was an electromagnetic pulse, but nobody knew it was going to be anywhere nearly as large it proved to be. They had all this data and they didn’t understand very much of it, including the EMPs that had been observed and the effects produced…all kinds of electrical disturbances were seen over 1000 kilometers away in Oahu.

Since then we’ve learned that a large nuclear device that gets detonated in the upper atmosphere could easily wipe out the electrical grid, and darned near anything connected to it. Which instantly brought up the question of its use as a military weapon. In fact there’s no question at all as to whether the US and Russia have experimented with EMP as a weapon and we’re also worried about North Korea ( and some say Iran) Here’s why…

Let’s suppose some rogue nation takes an old scud missile and tips it with a nuclear bomb. They get the thing near our coast on a container ship or what have you and fire it. The next thing you know an entire area of the nation sees its grid go down, and the resulting surges and brownout’s spread through the network. It is not inconceivable that the whole country could go dark. Here is the statement from the 2008 committee on researching EMP attacks…

A single EMP attack may seriously degrade or shut down a large part of the electric power grid in the geographic area of EMP exposure effective instantaneously. There is also the possibility of functional collapse of grids beyond the exposed one, as electrical effects propagate from one region to another…Should significant parts of the electric power infrastructure be lost for any substantial period of time, the Commission believes that the consequences are likely to be catastrophic, and many people may ultimately die for lack of the basic elements necessary to sustain life in dense urban and suburban communities.

Now, depending on whom you wish to listen to, the effects of a well coordinated EMP attack on the US could last for 18 months of “dark” (no electricity) and MILLIONS dead. I could EASILY see that.

As you probably know, my biggest “big picture” scare is that we are 100% reliant on the electrical grid for EVERYTHING. We just expect it to be there because it’s “always there”. Yet what if it wasn’t? Then yes, there would be mass starvation, mass riots, bands of roaming hungry thieves. No question.

I try and keep the “wacko stuff” and the real Fear Porn out of the letters. I’m not a “shock jock” like Howard Stern who gets his listeners from being outrageous. But in this instance, I am not just trying to scare the hell out of you all, I’m trying to expose something that seems to be all-too real. Consider this…

As late as the 1940’s once you got out of town, just about every rural household had a couple chickens in the yard for fresh eggs. They usually had a hand driven well pump and a few minutes of pumping that handle would bring good clean water up from the depths. They probably had a nice veggie garden, and “mom” probably knew how to can their produce for use in the winter months.

Dad and the boys most definitely had a few small game rifles, and knew how to hunt rabbit, squirrel, and deer. They generally had a coal or wood furnace, and knew how to cook over wood instead of electricity or Natgas. Oil lamps and candles made at home were frequent. In a lot of homes in rural America 1940 if the power went down, no one noticed for half the day.

Today that very situation would be called a “prepper family”. You’d be looked upon as “one of them people”. But the fact is that for about 80% of our citizens, they have NONE of those skills or resources. A chicken coop in modern America? Horror the thought! People get run out of Home owner associations for parking a vehicle in their driveway let alone a chicken coop. A personal water well on your own property? Not today, it’s all about “city water”. Grabbing a .22 and shooting a squirrel for dinner? Perish the thought! The fact is that the typical American is absolutely and totally dependent on the “grid” for survival.

So if you ask me - Bob, what’s your two biggest fears right now? My answer would be a take down of the Electrical Grid first, and a take down of the Internet second. Now do we have any “proof” that either one is coming? Nope, not really. But sometimes you see things that make you think about it.

For example, the Military is moving a lot of its command nodes back into the depths of Cheyenne mountain, a fortified bunker complex deep beneath the granite rocks. Why? Could they be anticipating something like an EMP attack and want to make sure their command and control center is “hardened” against suck a thing? Could be.

I’d like to say I only have two fears about the big picture, but that wouldn’t be truthful. Others on my list are a global monetary reset which I totally believe is coming. A devaluation of our currency which I think is coming. I think were going to get rocked a bit over that when it happens, and frankly it has to happen. Even the wicked Central bankers know that our present system isn’t working.

So “yeah” there’s things that get my attention.

No one wants to live in fear, and I don’t either. But there’s some things that we have very little control over, that have a lot of control over our lives. Power, Internet and global finances come to mind. All 3 of them have the ability to rock our world.

Urban Man

Monday, August 10, 2015

How to Use Pool Shock to Purify Water



"I read a very interesting article from a site called Back Door Survival on a better way to purify water other than using bleach.- Urban Man"

If I were to ask how many of you store liquid bleach along with your other prepping supplies, I am certain that a good percentage of you would raise your hands.  Liquid bleach is a powerful disinfectant and sanitizer but did you know that there is something better?  Something with an almost indefinite shelf life that is inexpensive and takes almost no room to store?

That something is the chemical Calcium Hypochlorite most commonly known as Pool Shock.

I have known about Pool Shock for years but because it is not readily available in my area, I never took the time to search it out so I could stockpile some for my own emergency preps.  That has now changed and today I plan to show you how to use Pool Shock the easy way, step by step.

Why Not Bleach?

Before we start, you may be asking “why not use liquid bleach?”.  There are a few problems with liquid bleach.  It takes a lot of room to store bleach plus the usable shelf life is only six month to a year depending on storage conditions.

The folks at Clorox say this:

The active ingredient in liquid bleach, sodium hypochlorite, is very sensitive to high heat and freezing, but under normal home storage conditions, it should still perform well for nine to twelve months.

In addition to a limited shelf life, there is another problem. I have had reports from Backdoor Survival readers telling me that in their area, they can only purchase “Clorox Ultra” which is concentrated.  When I called Clorox to ask how to use concentrated bleach to purify water, they said that it was not intended to be used in that manner and why would I want to do that anyway.  Seriously, their representative actually said that.

Pool Shock – The Boilerplate

When I started doing research for this article, I visited some of the most respected survival and preparedness blogs and forums for background material.  After all, pool shock is pool shock and there must be some standards for use, right?

With just one exception, all of the sites I visited included this boilerplate from the EPA:

You can use granular calcium hypochlorite to disinfect water.

Add and dissolve one heaping teaspoon of high-test granular calcium hypochlorite (approximately ¼ ounce) for each two gallons of water, or 5 milliliters (approximately 7 grams) per 7.5 liters of water.

The mixture will produce a stock chlorine solution of approximately 500 milligrams per liter, since the calcium hypochlorite has available chlorine equal to 70 percent of its weight.

To disinfect water, add the chlorine solution in the ratio of one part of chlorine solution to each 100 parts of water to be treated. This is roughly equal to adding 1 pint (16 ounces) of stock chlorine to each 12.5 gallons of water or (approximately ½ liter to 50 liters of water) to be disinfected.

To remove any objectionable chlorine odor, aerate the disinfected water by pouring it back and forth from one clean container to another.

Have your eyes glazed over yet?  Mine have. Being an accountant, I like to deal in absolutes so what is this business about “one heaping teaspoon”?  Plus, what’s up with the references to “approximately” and “roughly”?

I decided that it was  time to do my own testing, and sure enough, each time I measured out a heaping teaspoon, I had different results; they ran the gamut from 1 1/4 teaspoons to 2 teaspoons.  This made my head hurt.

Another thing.  Over and over I read that you should use pool shock that is a minimum of 78% calcium hypochlorite with the balance being inert ingredients.  Fair enough, but there are two problems with this. First, what you find locally may be 68%, it may be 78%, or it may be something else.  I sourced mine from Amazon and it was 73% calcium hypochlorite.  Second, the EPA, makes no such recommendation or at least none that I could find. They simply say “high-test”.

Did I mention this made my head hurt?

But there is more.  I actually found a couple of sites that said to use one heaping tablespoon of Pool Shock for each two gallons of water!  You know, just because you find something on the internet does not mean it is true.

My conclusion?  The exact amount and the exact percentage does not matter as long as it is within a reasonable range and close to the EPA standard.  I do think it is important that the pool shock does not contain other additives that may or may not be safe even when highly diluted.  Other than that, however, it is my belief that the precise percentage of Calcium Hypochlorite to inert ingredients does not matter as long as it is 68% or higher.

For my own use, I settled on 1 teaspoon of pool shock per gallon of water when making up my stock chlorine solution.  Then, to disinfect water, I used 3/4 ounce of my pool shock solution to treat a gallon of water.  This makes it easy to calculate how much to use, regardless of the size of your container.

Step-by-Step:  How to Purify Water Using Pool Shock

The first thing I did was gather my supplies.  Notice that I used eye protection goggles and rubber gloves.  Other supplies included an empty bleach bottle, funnel, shot glass, and measuring spoons.

I verified the size of my stock chlorine solution container, namely a repurposed bleach bottle.  My bottle held 1.42 gallons and I wrote this on the outside with a Sharpie pen.  My intent, however, was to only prepare 1 gallon of stock solution to keep the math simple.

After donning my protection gear, I added water to my stock solution bottle, carefully measuring the quantity.  I used exactly one gallon of water.

I then measured out some pool shock; one level teaspoon to be exact.  I put the cap back on the bottle and swished it around a bit. I gave it a sniff test and it definitely smelled bleach-like.

The next step was to purify water.  I wanted to make drinking water and for me, the smaller the jug the better.  I chose a 64 ounce repurposed apple juice jug.  Remember the easy math?  The EPA says 1 part chlorine solution to 100 parts water so the math is 64/100 = .64 ounces.

Keeping things easy, that translates into approximately 2/3rd ounce.  Remember, the EPA guideline uses the word “approximately” all over the place.  That was good enough for me.  To easily measure the proper dilution, I used a mini shot glass that had measurement markings along the side.

Be sure to pour your pool shock into your water and not the other way around.  The last thing you want is to splash the solution on yourself on the surrounding surfaces (although you have probably noticed that I did this outdoors).

After preparing my newly purified water, I drank up.  Three things.  I did not throw up, I did not get diarrhea and I did not get sick or die.

I am comfortable with the results even though the solution I made may have been slightly stronger than the EPA guidelines.  Then again, given the vagueness of the EPA guidelines, perhaps my measurements were spot on.

Note:  I did not find that my water had an objectionable smell or taste.  True, it was not sweet tasting like the water coming out of my Royal Berkey but it was palatable.  If your own purified water has an unpleasant odor, simply aerate it by pouring it back and forth between clean containers.  This trick applies to any water, not just water treated with pool shock.

Label your pool shock solution.  This is powerful stuff.  Get out your Sharpie and label the jug with as much information as you can.  Store it in the same manner you store liquid bleach, up high and away from pets and children and in a location that is cool, dark and dry.

Also store your unused pool shock safely.  Because it is corrosive, I chose a mason jar with a plastic lid.  Plus, rather than empty the pool shock into the jar, I sealed the plastic bag it came in with a clip and stuffed the bag inside of the jar.

Other Handling and Storage Considerations

I contacted the manufacturer of the pool shock I purchased and requested a Material Safety Data Sheet on the product.  They promptly responded and here is what it said about handling and storage:

Keep product tightly sealed in original containers. Store product in a cool, dry, well-ventilated area. Store away from combustible or flammable products. Keep product packaging clean and free of all contamination, including, e.g. other pool treatment products, acids, organic materials, nitrogen-containing compounds, dry powder fire extinguishers (containing mono-ammonium phosphate), oxidizers, all corrosive liquids, flammable or combustible materials, etc.

Do not store product where the average daily temperature exceeds 95° F. Storage above this temperature may result in rapid decomposition, evolution of chlorine gas and heat sufficient to ignite combustible products.

Now that I have been through the process and understand the math, I am confortable using pool shock to purify water for drinking, hygiene, and sanitation purposes.  It is not, however, an excuse for not storing water nor an excuse for not having a supply of traditional water purification liquids or tabs that are pre-measured and simple to carry with you in bug-out-bags and emergency kits.

As far as I am concerned, the pool shock I have purchased is reserved for dire emergency use, period.  Yes, I feel it is safe, but it is still a powerful chemical solution as is liquid bleach.  I will use it as the water purification method of last resort and if the time comes, I will be thankful I have it on hand.

Disclaimer

I have to say this: I am not a chemist and I am not an expert.  My methods are my own and they work for me.  That being said, if you have any hesitation at all, visit other resources including the EPA and make the decision to use pool shock your own and not just something someone told you to do.  Here is a link:  Emergency Disinfection of Drinking Water.

The Final Word

Everywhere you look you will see a recommendation to  store bleach for water purification. I have made that recommendation and so have many, if not most, of my blogging peers.  What you may not have seen is that liquid bleach has a limited shelf life of 6 to 12 months.  I fear that this could be leaving a lot of people ill prepared to produce safe, potable water in an emergency.

This means that a person that began prepping a year ago, and does not know to rotate their bleach, is already living with false security when it comes to water purification.  And what about people that have been prepping longer?

As long as pool shock is stored properly, it will have an almost indefinite shelf life plus, a small one pound package will treat many thousands of gallons of water. Ten thousand to be exact.  It can be mixed and used as potable water and as a disinfectant, just like bottled liquid bleach.

At the end of the day, do your own research and decide for yourself.  All I can say is that for me, the $13 investment was more than worth it for peace of mind down the road.


Urban Man