Cookies

Notice: This website may or may not use or set cookies used by Google Ad-sense or other third party companies. If you do not wish to have cookies downloaded to your computer, please disable cookie use in your browser. Thank You.

Sunday, December 9, 2012

Government Preparing for Martial Law

UrbanMan: I get a few e-mails from time to time asking my opinion on scenarios that could bring about martial law: if it is possible that our Muslims enemies could generate attacks on the homeland in sufficient density to force martial law;......domestic terrorism such as attacks and bomb threats that some may think the government is behind in some sort of conspiracy in order to generate an excuse for, or a popular calling for martial law; and/or, if an economic collapse or hyper-inflation is sufficient to create wide spread food shortages and riots, would the government implement martial law.

While not a conspiracy theorist by nature, nor believing that the government in all it's capacity would have the resources to control this country by force, it is a bit concerning that in the space of one year the government passing the NDAA and the lesser known NDRP, and is considering a new law authorizing warrantless electronic searches. SO,.....while I remain to been convinced of a larger government plan, I do know that the economy will get worse, affected by natural conditions such as disasters and droughts;....that the dollar will inflate causing much more of our income to go towards essentials such as food and further stimulating a downward slide in the economy as less moeny will be able to expand businesses.

I remain oriented towards planning and preparing for bad times, no matter what the cause. But I do contiue researching and analyzing the potential causes and course of events that would make our preparations a worthwhile endeavor. Below is an article written by Tony Adkins of the Conservative Daily:

A warning from the Conservative Daily

In December of 2011 on New Year’s Eve, President Barack Obama signed the National Defense Authorization Act (NDAA), declaring the entire United States a “battlefield” and giving the U.S. government the right to detain an American citizen indefinitely and even assassinate them, if they are suspected of terrorism—without due process.

Then, in March of 2012, Obama signed the National Defense Resources Preparedness Executive Order (NDRP) that effectively declares peacetime martial law, giving the President authority over food and water, production, fuel, transportation, livestock and more if the government decides it is an emergency.

Since September 11, 2001, the government has found every way to make exceptions to our Fourth Amendment protections and claim legal right to search and seizure of our private property—all in the name of safety, of course. But haven’t the terrorists “won” when America ceases to be America? They want to kill our freedoms and they want us to live in fear. They don’t have to do much, because our own government is moving their agenda along by killing our

The average, law-abiding American may not see the small yet consistent changes in our Bill of Rights protections, but we are the ones who need to pay attention to these attacks on our freedom and stop them before government takes total control. At one point or another, the long arm of the government will reach into every American home and by then, it will be too late to change our path.

Journalist Chris Hedges brought suit against the constitutionality of the NDAA, resulting in federal judge Katherine Forrest’s ruling that it was, in fact, unconstitutional (the Obama administration continues to insist it is within the realm of the law). In an interview he said of the NDAA, “It is a huge and egregious assault against our democracy. It overturns over 200 years of law, which has kept the military out of domestic policing. It’s an extremely frightening step backwards for American democracy. And I think that for those of us who care about civil liberties, the right of dissent and freedom, we have to stand up.”

We want to catch the radical Islamists and others who want to kill us, but we do not accept the government eliminating our Bill of Rights protections and having full, unchecked authority while doing it. We cannot give up our freedoms as the government tries to “fix” problems that have already happened.

Our job is to remain watchful of our rights and make sure our government doesn’t take the focus off the real terrorists and begin labeling anyone who simply has a dissenting opinion, the enemy.

This is a concern because the Department of Homeland Security funded a study, which hardly mentions Islam at all, yet labels terrorists as including:

Americans who are suspicious of centralized federal authority; Americans who believe their way of life is under attack; People opposed to abortion; Americans who are reverent of individual liberty

Our warnings on this issue are not meant as “doom and gloom” conspiracy theories or crazy rants with no basis in fact—they are just that, warnings, because we see too much power and control being concentrated in the hands of the government and this regulation crept into the hands of one man in the Oval Office is what has us so concerned.

Many have warned of possible martial law in the U.S., even those outside of it. Igor Panarin, dean of the Russian Foreign Ministry School for future diplomats, lectured in 2009 that the U.S. would begin to collapse in 2010 and compared America to Nazi Germany. He said mass immigration; economic decline, moral degradation and the collapse of the dollar will send America reeling into another civil war.

Regardless of whether you believe comments coming out of Russia, given our current circumstances, that scenario is not out of the question.

Absolute power given to any person, regardless of their worldview, is dangerous. Lord John Dalberg-Acton warned, “Historic responsibility has to make up for the want of legal responsibility. Power tends to corrupt and absolute power corrupts absolutely. Great men are almost always bad men, even when they exercise influence and not authority: still more when you superadd the tendency or the certainty of corruption by authority. There is no worse heresy than that the office sanctifies the holder of it.”

Actions being taken by President Obama are not entirely new. The NDRP is rooted in the Defense Production Act of 1950, which gave the government the power to dispense “national resources” in the event of an emergency. Unlawful detainment of U.S. citizens occurred during the Civil War and under Roosevelt during World War II. What Obama is now doing is “editing” these Acts and Executive Orders to further the framework for a complete takeover by the executive branch, should he declare America is in an emergency.

And since Obama has been President, everything has been an emergency. The stimulus, Obamacare, Internet regulation and war in Libya, to name just a few, have all been pushed because “we can’t wait.” Now, government departments are stockpiling ammunition, checkpoints and riot gear. The U.S. is on the verge of an economic collapse. The United Nations continues to poke its nose into our business and our President is complicit in their meddling.

That is why the current versions of the NDAA and NDRP are so troubling. The NDAA is a broadly vague bill that is needs to be reviewed in its entirety. It is the same Act that allows the government to run propaganda on American people. Its language in direct opposition to what the United States of America stands for. And this is how America dies, slowly, little by little, with signing statements and amendments and executive orders that the American people hardly notice and of course the media giants rarely report.

Why is Congress silent on this? We sent them to Washington to represent our interests and defend our rights under the Constitution. On their watch, we are experiencing the unraveling of hundreds of years of guaranteed and protected freedoms.

Tell them to govern by the Constitution and reject all attempts at destroying it, or we will kick them out of office and vote someone in who will. Fax them now and demand they support S. 2175 and H.R. 5936, which will repeal the mandatory military detention requirement and ban indefinite detention and military commissions from the United States.

Involved citizens like you who keep up with what is really going on in Washington are the last line of defense against tyranny. It is not okay for our government to lock up American citizens without charges or due process. If they will not defend our Constitution, we will.

Congressman Ron Paul says, “The Bill of Rights…is a key check on government power against any person.” Are we willing to let that check be eliminated? Sincerely, Tony Adkins, Conservative-Daily.

Thursday, December 6, 2012

Ruger 10-22, the Survivalist's Necessary Rifle

Anonymous has left a new comment on our previous post titled "Urban Survival Tool – Survival Rifle":   "I just bought a Ruger 10-22 "Take Down" instead of the AR-7. It was a few more dollars but well worth it. It's a very well made rifle, breaks into 2 parts right in front of the receiver, very reliable, and you can get 30 round clips for it. It comes with a very nice soft backback case that will fit in most back packs and bug out bags. Nothing against the AR-7 but the 10-22 has a lot of pluses. "

UrbanMan's comments: I too have a Ruger 10-22. I also have two other .22 LR rifles and one handgun, another Ruger product - the Mark II. There are many after market accessories made for the Ruger 10-22,...from extra capacity magazines, to stocks both full length and folding, to scopes, bases and mounts, trigger kits, muzzle breaks (as if you needed one), and many others. The Ruger 10-22 cas it comes out of the box is as good as factory original gets. I would suggest adding some extra capacity magazines and none are better for the Ruger 10-22 than those that comes from the factory.


This means the Ruger BX-25 magazine (shown at right) which is a 25 round curved box magazine if you couldn't figure out the round count from the name. Pro-Mag makes a 50 round drum magazine which is worth looking at. I have tried many of the plastic magazines even the ones with steel feed lips but I would hesitate to recommend them.






Pro-Mag, 50 round drum magazine, shown at left, is another option.  I don't have one and I think I'll be sticking with my factory 10 round magazines and the 25 round box magazine. 




Double K makes essentially a speed loader pouch, advertised on Cabela's that shows two Ruger factory 10-22 magazines fitting into where you would normally carry the speed loaders for revolvers.  I didn't even think about this, nor do I have any other pouches to keep my 10-22 factory rotary magazines, so I tried them in an old speed loader pouch - it's a tight fit but they'll work. 

While many will take exception to my calling either a .22 LR rifle or specifically a Ruger 10-22 a necessary component of the Survivalist's firearms battery, I'll stick to my guns (no pun intended) and say that one is absolutely necessary.

From training to hunting small game there are many uses. Ammunition is cheap and a lot of it is easily stored in small spaces. While I also have an AR-7. It is a true survivalist's rifle as it stays inside it's butt stock and inside one of my Bug Out bags.

Monday, December 3, 2012

More Comments: Survive the Collapse by Bugging In

Lot's of debate on whether to Bug In or Bug Out.  I don't think anyone can cast a blanket solution for either.  Way too many factors depending on the situation.  Here is an Anonymous comment regarding a previous post that analyzed the question: "Bugging In - Not the Answer?":

”There will be hundreds of thousands of people with the same idea as you. Hunting, fishing, foraging...etc. I live in a small city next to Lake Erie, and I know that thousands of people will be using the lake and the rivers for their survival. I will not go anywhere near there in a real survival situation. The wooded areas will be teeming with "wanna-be" hunters trying to bag dinner for their family when the food runs out. I have very few places I can bug out to, and I have a feeling that there will be a mass exodus from this area if we lose utilities, and trucked in food anyway. That is unless the National Guard, police, and other agencies do not shut down or restrict travel. My job, and skills will keep me local anyway, as I will be part of the emergency response personnel working. So bugging in is my only viable route. Plus, I have aged parents living locally, who can't travel to well. My father can barely walk. I have built a family plan that has turned into a neighborhood plan. We will all stick together, or die separately. That's my two cents. “

UrbanMan replies:: Thanks for your comment, it is worth much more than two cents. You evidently saw the reader comment “get a field guide, learn edible plants and go live in the woods” and the responding comment that “get a field guide for edible plants?,… yeah and they will find you dead in the woods,…..with your field guide open laying besides you.”

Both are true comments.  I am prepping for a Bug In at my suburban location. You are helping my point about people make the conscious decision to Bug In, despite additional disadvantages or risks. Has to be a conscious decision weighting all the threat factors and your resources. In your case, it sounds like the major risks of trying to survive by yourself or in a real small group are mitigated with the development of a neighborhood plan.

The major disadvantage of a larger survival group, prepping and living separately, is that some will prep harder than others, and some will hold a grudge on people would did not prepare as well as they should have. Basically, your plan is like mine, aside from my core group of now, eight families consolidated at my house. The neighbors I have been talking to will be offered support, more on the advice side than the giving them supplies side.  But every decision will be weighed based on the security and safety of the group.

If a person plans well, given geographic variables such as anticipated refugee routes, and areas that will be a target of looter gangs such as warehouse areas, shopping malls, even smaller strip malls and individual retail stores, then I think it is possible to be reasonable safe if an adequate survival team is developed,  precautions and procedures instituted, supplies stocked and contingency plans developed.

You know that probably a large extent of your procedures, be it security procedures, individual or team responsibilities, additional training requirements, communications plans, will most likely be decided after the need or threat already exists,…meaning after the initiation of the collapse. Most people will simply not get it until the need is starring them right in the face. Let’s hope it is not too late. I think the bigger survival team you have within your neighbor will make it easier to rally non-team families and members into your group for the greater good.

Friday, November 30, 2012

Computer Security for Pre and Post Collapse

With the significant amount of preppers that believe in the probability that the coming collapse will be either generated by the Government or will result in a heavy handed Government exerting martial law across the land, I offer this article on computer security.

While the Government has phenomenal capabilities when it comes to electronic tracking and eavesdropping, this capability is spread across many different agencies, so it is not a central location manned by 25,000 intelligence analysts per shift. It is really a bunch of diverse agencies and even separate offices within these agencies who don’t like to share information because it degrades the other’s power and status. So when people try to convince me of large government conspiracies, I always think and sometimes speak out and say,…”Really? This is the same government that is bankrupting social security?...the same government that purchases $3,200 office chairs and $5,000 hammers?.......the same government that wear clown suits to work, shoots funny videos and posts them to You Tube? “

Some of this article came from a Yahoo! article on computer security when shopping, but the same principles apply. See bottom of article on the Poor Man's e-mail communications.

Browsing the web anonymously? Think your online activities are private? Think again. Not only are your surfing sessions tracked by websites, search engines and social networks, but often your Internet service provider (ISP), web browser, government and potentially hundreds of online tracking companies. Whether it's to collect valuable marketing data or prevent terrorist activity, movie piracy or kiddie porn, everything you think you're doing privately in the comfort of your home is anything but private.

But just because you want to spend time online anonymously doesn't mean you're a cybercriminal or have something to hide. Not only do regular folks want privacy, but remaining anonymous can also protect yourself from malicious types out to steal your identity for financial gain — from spammers and scammers alike. And so there are a few things you can do to reduce the odds every click is tracked, archived and shared. The following are a few suggestions on where to start.

Software
How does Facebook know to show you ads for your local gym, supermarket or college? This is because your computer's unique Internet Protocol (IP) address, assigned by your ISP, reveals your geographical whereabouts. Even if your computer generates a different IP address every time you boot up or log online, this number (e.g. 220.165.119.12) can still tell of your general location.

And so there are many different solutions that can hide your Internet connection, allowing you to remain anonymous while online. Some are websites, such as free "online proxy servers" that conceal your identity — simply point the web address (URL) to the proxy server and surf right from their website (check out proxy.org for a list of great options).

Others prefer Virtual Private Network (VPN) software that encrypts your online sessions. The browser-independent Hotspot Shield from AnchorFree, for example — available for Windows, Macs, iPhone and Android — channels all web activities through a personal VPN and secures all Internet communications by turning all HTTP traffic into the safer HTTPS (which is what your bank uses for a safe connection).

Free to use but with more features packed into the "elite" version ($29.95), Hotspot Shield is ideal for email and instant messaging, too, and reduces the likelihood of identity theft because you're not leaving a digital footprint -- including cyber-snoopers and rogue connections at Wi-Fi hotspots, hotels, airports, and so on.

Similarly, Tor is free software that defends you against Internet surveillance that threatens personal freedom and privacy. Short for "The Onion Router" — which gets its name for its "layered" approach to the encryption process -- Tor provides online anonymity as the software routes Internet traffic through a worldwide volunteer network of servers to conceal your location or online usage patterns.

Use USB sticks.  
In some cases, software to encrypt your connection is kept on a USB drive — therefore you can remain safe and secure even when using a public PC.

SurfEasy ($59.99) is a tiny USB key that fits into a credit card-shaped case to be kept in your wallet. When you plug it into a PC or Mac -- be it your own computer or a communal one -- it instantly launches its own password-protected browser and you're good to go -- no proxy or network settings to configure. Your browsing session is handled through SurfEasy's fast and secure private proxy network.

Your IP address will be masked throughout the session. A fr

ee alternative is called Tails, which can be downloaded and installed onto a USB stick to run independently of the computer's original operating system. Like SurfEasy, it lets you browse the web anonymously -- on virtually any computer — as all connections are channelled through the aforementioned Tor network.

Browser tweaks Anonymous proxy software is a great way to mask your IP address online, but there is still plenty of information about your web surfing habits stored on your computer — which could also be viewed over a network, say, at the office, by your IT department. At least it's somewhat easy to control your privacy settings directly in your web browser — unless your business forbids non-administrators from making changes to your browser settings, that is.

You can disable cookies — tiny text files stored on your computer with information about where you've been online, passwords and other info — and you should also delete your browser history to cover your tracks. All major web browsers — such as Internet Explorer, Firefox, Chrome or Safari -- allow you to delete your surfing history: simply go to the Options or Settings in your favorite browser and you'll see how to do this.

You might want to turn off auto-complete or someone on your computer could type in a few letters in a search engine or web address (URL) bar and any recent places you visited could fill in automatically. And don't click to allow sites to "remember my password" or someone could gain access to your private or financial information.

The easiest thing to do, however, is to see if your web browser has settings for surfing incognito — most of the major browsers do today. By enabling these privacy settings, your browser won't save any history (and download history), search queries, cookies or passwords. On a related note, Twitter recently announced a "Do Not Track" feature that prohibits the service from collecting info about its millions of users. Nice.

And Microsoft, in June 2012, said its upcoming Internet Explorer 10 browser -- expected to launch alongside Windows 8 later this year -- will not collect data about the online activity of its users by default. 'Do not track' tools and plug-ins Google raised a few eyebrows earlier in 2012 with its revamped privacy policy, which was updated to allow for the sharing of information between its various services such as Google Search, Gmail and YouTube. Therefore, if you search for recipes in Google Search you might be presented with cooking-related videos on YouTube. Handy? Sure. Invasion of privacy? Debatable. You could choose not to log into your Google account when using these services (er, or not use them at all) or you might want to install one of the free browser plug-ins that tell Google and other advertisers to back off.

One called Do Not Track Plus from Abine blocks marketers, search providers and social networks from tracking your online activity — and it's compatible with all major web browsers. After it's installed, a small icon will appear to the right of the browser's address bar to tell you if a website wants to send data from your visit to other companies. Speaking of requiring a login name and password on a variety of sites, some web-based services like Anonymizer can automatically generate temporary email addresses with unique usernames and passwords for any site you wish to access (excluding your bank or shopping sites, of course, or you can't access your account).

Similarly, another solution called BugMeNot lets users post free usernames and passwords for shared access to popular websites like video sharing sites and newspapers.

Poor Man’s secure E-mail
One of the easiest things to protect communications from two or more different people or groups that are geographically separated is to use the same e-mail account. This would require giving the account e-mail and password either face to face or through hard copy correspondence,….yes, the U.S. postal service is good for something.

Each party can access the e-mail account and left a message for the other saved in the drafts folder so the message does not have to be sent out over the internet. The subject line and to address should be benign and fake respectively. Using simple encryption, such as a book code, for the text of the e-mail text can enhance message security from all but the most sophisticated agencies.