We all know by now that the government collects metadata. You might also already know that metadata does not keep the call itself, only who and for how long. What you don’t know is how complete a picture you can get of someone’s life from metadata. A Dutch correspondent, however, does. He used an app to track his own metadata for a week and then published the results in an effort to draw attention to what metadata actually shows. Those results are far past disturbing.
From one week of logs, we were able to attach a timestamp to 15,000 records. Each time Ton’s phone made a connection with a communications tower and each time he sent an e-mail or visited a website, we could see when this occurred and where he was at that moment, down to a few metres. We were able to infer a social network based on his phone and e-mail traffic. Using his browser data, we were able to see the sites he visited and the searches he made. And we could see the subject, sender and recipient of every one of his e-mails.
So what can we find out about him from just that information? A lot. Far more than any government should know about the average citizen. Take a look:
Continue reading “Metadata: The Map to Your Life and Operations”
Greetings, Patriots! Today we’re going to start a series on spycraft. To be specific Allen Dulles‘ 73 Rules of Spycraft. Let me be completely frank here: I am in no way an expert on this subject. I’m just an interested layman. However, I believe there is a lot that we as patriots, III%-ers, and preppers can take away from these rules, if we just adjust them for our situation. Let’s look at the first eleven rules.
1. There are many virtues to be striven after in the job. The greatest of them all is security. All else must be subordinated to that.
I think that up front, it’s best to acknowledge that security is hard. It’s inconvenient, and it doesn’t often make you friends. I know that I make compromises with my security regularly to fit in with normal society and for familial peace. However, being aware of the principles will help you make adjustments where you can and be wise about where you compromise.
2. Security consists not only in avoiding big risks. It consists in carrying out daily tasks with painstaking remembrance of the tiny things that security demands. The little things are in many ways more important than the big ones. It is they which oftenest give the game away. It is consistent care in them, which form the habit and characteristic of security mindedness.
In our circumstance it’s important to turn our minds more toward security. Think about who you’re talking to, what’s around you. Take time to consider your passwords (we’ll discuss password selection in another article). Shred your documents and use good litter discipline.
Continue reading “73 Rules of Spycraft for Patriots – Rules 1-11”
We’ve already discussed in previous articles how the traditional hierarchy (or pyramid leadership) is a poor choice for the type of situation we find ourselves in as patriots. This type of leadership works for those who want/need to “belong” to something, lack the ability to act without someone giving them direction, or choose to be involved with more public activities. Standard militia units also benefit from the pyramid structure for obvious reasons. Behind the public face of the groups rallying and engaging in obvious activism, however, is where the rest of the movement operates. These are faceless, nameless patriots who train in private, operate in small groups, and choose to limit their “footprint” to their tight circle. Their cell-based structure and security levels mean that they can remain ‘under the radar’ until they are needed. What are they doing that the more public groups are not? A great deal, it turns out, and today we’ll deal with some of the basic security considerations for groups.
One thing that needs to be noted: There is a difference between “grey” groups who are actively training, preparing, and operating, and those who spend their time on Facebook talking a big game as though they will suddenly jump up and join the fight if bullets start flying. If the most you do is post memes and maybe show up to a rally now and then to wave a sign, this article is not for you. If you’re part of an effective group, you’re probably already doing these things. This article is for those who either 1) want to tighten their security procedures in an existing group or 2) are serious about setting up a group and want to do it right.
Continue reading “Six General Security Considerations for Groups”
One of the biggest issues that we as Patriots have is the need for secure communications. The way that we are used to communicating on the internet offers the federal government a full window into everything you do, say, buy, as well as everywhere you go and who you talk to. For those who are tired of that, there are options. The first is changing to an operating system that does not act as a data collection platform, like Windows does. Linux is the natural alternative for those looking to “clean up their act,” so to speak, and make a much smaller profile. Kali Linux is especially well-suited to security, having been built specifically for that purpose.
For those who are making the jump to Linux (and you SHOULD be), the next logical question is how to start operating a manner that’s more secure. Part of that discussion is setting up a VPN, or virtual private network. If you don’t understand how a VPN works, you can study up on that here. For now, we’ll assume that you’re familiar with what a VPN does, but perhaps you’re new to Linux and specifically Kali, and need a bit of guidance to get started. This guide is specifically for Private Internet Access, which I find to be one of the best ones on the market. Regardless of which VPN provider you use (TorGuard is another excellent one), this guide will work to get you the necessary setup for enabling VPN.
Continue reading “How to Set up a VPN on Kali Linux”