Tradecraft for Patriots: The Chess Game

In this second installment of our series on Tradecraft for Patriots, we’ll talk about what you’re protecting and what you’re up against. It’s no secret that the government does not agree with what you do. There’s a reason why they want your life open for inspection and your guns taken away. Their objective, of course, is control. Tradecraft makes it that much harder for them to achieve it.

Counterintelligence is the information gathered and activities conducted to protect against espionage, infiltration, surveillance, and other nasty things. It’s used by governments to protect against other state actors, but it’s also become one of the favorite activities of our own government against its citizens—especially us, patriots who stand against tyranny. TOWR, and many other patriot or III% groups, are not anti-government. We are anti-tyranny, and only seek a return to the constitutional form of government that adheres to the limits set by the Founders. That doesn’t matter, however. Patriots stand in the way of their agenda, and that makes us targets.

It all becomes a chess game, where the stakes are far higher than losing a piece on the board. It requires strategy, analysis, and a lot of careful planning and thought.

Continue reading “Tradecraft for Patriots: The Chess Game”

Tradecraft for Patriot Groups: Overview

[dropcap]H[/dropcap]ere at TOWR we talk a lot about privacy and security, and it can seem pretty overwhelming in the face of all the technology out there. Nothing is 100% secure, and patriot groups have the added attention of a federal government who views us as domestic terrorists. The truth is that engaging in privacy and security measures online isn’t enough, especially for those involved in the intelligence side of things. Past that, even the most junior member of your group needs to understand the basics of what we call tradecraft. We are considering offering a class specifically on this in the spring, but for now this article series will give you an idea of the actions and behavior patterns that you as a patriot need to be familiar with—and engage in—if you want to keep yourself and your group safe.

Keep in mind that this series is NOT to help you commit violent, unconstitutional, or immoral acts. Please view the Creed of the Order for clarification on this. Our goal here is simple: Just being a Constitutionalist means you are a threat. Protect your contacts, your capabilities, your training levels, and anything else attached to your activities. We offer this series in an effort to help you at least get started thinking about how to implement it in your groups—or even in your individual life and activities.

In this first installment, we’ll talk about the types of patriot groups out there, and the types of tradecraft there are. You may find that not all of it applies to you (such as if you’re in a group that is purposely public). You may not want to bother with it yourself. But you may also realize that you might need a dedicated intelligence officer in your group, and you might also realize just how effective tradecraft is at protecting you, your group members, and your activities. Let’s get started.

Continue reading “Tradecraft for Patriot Groups: Overview”

20 Web Pages, 500 Trackers

We all know that web sites often load trackers and ad programs when we visit. This is why it’s recommended that you use plugins like Ghostery, or take other steps to block those trackers. But how bad is it really? Try 500 trackers in 20 pages.

Politico, for instance, has over 100 trackers in its site. In one test, it loaded 89 of them on one visit to its front page. The Daily Mail, another popular site, was even worse.

A single click on its Mail Online flagship sends a whopping 672 requests, but it manages to run them at blazing speed (19 sec loading time) for a feather weight of 3 Mb, including 2.7 Mb for 578 super-optimized pictures that don’t exceed 120 Kb each.

The Mail Online wins many digital speed/weight records. It is one of the most optimized web sites in the world (see our last week story on the obesity plaguing the news industry). But when it comes to monitoring users, The Mail Online also scores high with 79 trackers loaded in one stroke (see below), of which I was able to detail only 63 in my main table:


These two sites aren’t alone. The author of that article tested 20 popular sites such as CNN, Wired, and others, and found over 500 trackers. Chances are extremely high that you visit at least one of these sites on a daily basis; then again, if you visit ONE of them, ONE time, you’re already tracked.

To get an idea of how complete a picture they get, now multiply that by all the times per day you visit, the places you are when you visit, and how you connect. Maybe you read your Facebook feed in the morning with your coffee between 0630 and 0700, and you visit a few links that go to CNN or Daily Mail or Politico. You connected via your wifi at home, so now there’s a series of data points showing that you are home at that hour every day, and that you probably leave for work between 0700 and 0730. Maybe you go to those sites on your lunch or break or while waiting on the train, carpool, or even in traffic. That’s another time/date stamp with location. None of this is even counting the part where it tracks what you click, what you like, buy, talk about, think about, and how all of that dovetails with other information about your browsing habits, interests, and what kinds of things you’re searching for on the internet.

If you’re a bit freaked out, that’s normal. If you’re angry and want to do something about it, now you’re on the right track. There are ways to stop these trackers from pegging your every move and time of movement. We’ll show you some of them at the Cryptoparty on December 5th. It’s free, so make plans now to attend. In the meantime, check out Ghostery.


73 Rules of Spycraft for Patriots – Rules 12-21

Happy Monday, Patriots!

My apologies for this next spycraft article taking as long as it did. No excuses, I just didn’t get it out as soon as I had hoped. More cool stuff is falling into place here at TOWR, so stay tuned.

Without further ado, let’s see what Mr. Dulles has for us today. The full piece we’re quoting is available here. This is part two. Use the navigation links to find part one if you’re lost.

12. Booze is naturally dangerous. So also is an undisciplined attraction for the other sex. The first loosens the tongue. The second does likewise. It also distorts vision and promotes indolence. They both provide grand weapons to an enemy.

13. It has been proved time and time again, in particular, that sex and business don’t mix.

Many patriots believe that what an individual does to their own body is their own business and no business of the state. We would agree. However, if your mind is clouded with alcohol, lust, or mind/mood altering drugs, you are not able to operate as wisely as you need to. We face an opponent that is better equipped and has a longer supply chain than we do; we can’t afford to handicap ourselves further by regularly impairing our judgement.

That’s not a suggestion that you not have fun or drop booze entirely. I drink a few times a week, but never enough to impair my judgement.

14. In this Job, there are no hours. That is to say, one never leaves it down. It is lived. One never drops one’s guard. All locations are good for laying a false trail (social occasions for instance, a casual hint here, a phrase there). All locations are good for picking something up, or collecting… for making a useful acquaintance.

15. In a more normal sense of the term “no hours,” it is certainly not a business where people put their own private arrangements before their work.

16. That is not to say that one does not take recreation and holidays. Without them it is not possible to do a decent job. If there is a real goodwill and enthusiasm for the work, the two (except in abnormal circumstances) will always be combined without the work having to suffer.

Dulles deals a bit more here with work/life balance. For us, I think the takeaway is that we should always have liberty on our mind, and evaluate/cultivate relationships accordingly. Keep building your network, even if the people you’re dealing with are not patriots or preppers. The time may come when you need to have a friend in their business, or at least an acquaintance that won’t turn you in.

Addressing points 15 and 16, we have a bit more of a delicate balance than the professional spy. For us, “private arrangements” are the reason we do what we do. It does us no good as individuals to be completely prepped for everything, to be active in liberty circles, and to go to every rally, if we lose our families in the process. Even if you have to go slowly, every step you take toward liberty now is one less you’ll need to take later.

17. The greatest material curse to the profession, despite all its advantages, is undoubtedly the telephone. It is a constant source of temptation to slackness. And even if you do not use it carelessly yourself, the other fellow, very often will, so in any case, warn him. Always act on the principle that every conversation is listened to, that a call may always give the enemy a line. Naturally, always unplug during confidential conversations. Even better is to have no phone in your room, or else have it in a box or cupboard.

Well, this is certainly a loaded topic that we could do a whole post on by itself.

What would Dulles say about the modern cell phone? Consider some of the ways that it can be used against you:

  • Call intercepts.
  • Location via tower triangulation.
  • Location via GPS tracking.
  • Location via social media check in.
  • Email intercept via broken apps.
  • Email intercept via screen scraping.
  • Eavesdropping via remote microphone activation.
  • Activity monitoring via motion sensing.

As Dulles says, even if you mitigate those issues by leaving the phone at home or removing the battery, others you meet may not be as careful. Certainly, remove the batteries of your phones, use signal blocking bags, or leave them home when you need to discuss important issues.

Don’t forget other technologies that can spy on you as well – smart TVs, Kinect, laptops, and tablets.

18. Sometimes, for quite exceptional reasons, it may be permissible to use open post as a channel of communications. Without these quite exceptional reasons, allowing of no alternative, it is to be completely avoided.

19. When the post is used, it will be advisable to act through post boxes; that is to say, people who will receive mail for you and pass it on. This ought to be their only function. They should not be part of the show. They will have to be chosen for the personal friendship which they have with you or one of your agents. The explanation you give them will depend on circumstances; the letters, of course, must be apparently innocent incontinence. A phrase, signature, or embodied code will give the message. The letter ought to be concocted in such fashion as to fit in with the recipients social background. The writer ought therefore to be given the full details of the post boxes assigned to them. An insipid letter is in itself suspicious. If however, a signature or phrase is sufficient to convey the message, then a card with greetings will do.

In today’s world, it’s easy to forget that email is just as available to state actors as regular snail mail, unless extraordinary protections are taken. Serious conversation should not take place over email unless those protections are taken, and even then, only when it cannot be avoided.

If you’d like to learn more about some of those protections, come to our cryptoparty on December 5th in Renton, WA. It is completely free. It’s not a class in the traditional sense, but still a great learning opportunity for people of all skill levels.

Back to the rules, number 19 brings to the forefront the need to have codes established in case you need to communicate in clear text. Those codes will be up to you and your group, and be operationally dependent. Simple is better, but do what you need to to in order to accomplish the mission.

20. Make a day’s journey, rather than take a risk, either by phone or post. If you do not have a prearranged message to give by phone, never dial your number before having thought about your conversation. Do not improvise even the dummy part of it. But do not be too elaborate. The great rule here, as in all else connected with the job is to be natural.

There’s not much to add here. Make the safest choice when lives are in the balance, and be natural.

21. If you have phoned a line or prospective line of yours from a public box and have to look up the number, do not leave the book lying open on that page.

Our modern equivalent would be “Don’t search for something sensitive over the open Internet.” Your search history will come back to bite you and those you care about. At the least use a live CD and a search engine that doesn’t save your history, like Better would be to use Tails from another network (such as McDonalds or Starbucks).

Well, that seems like a good stopping point for today. As always, thank you for your support. Don’t forget our upcoming events, the Sparks31 Communicator Course on November 14-15, and the Cryptoparty on December 5.

Please pray for us as we decide what classes to offer next, pray for Christians around the world and at home as they are persecuted, and pray for wise, dedicated patriots to rise up and prepare for whatever is coming next for our nation.

Educate. Empower. Resist.

Metadata: The Map to Your Life and Operations

We all know by now that the government collects metadata. You might also already know that metadata does not keep the call itself, only who and for how long. What you don’t know is how complete a picture you can get of someone’s life from metadata. A Dutch correspondent, however, does. He used an app to track his own metadata for a week and then published the results in an effort to draw attention to what metadata actually shows. Those results are far past disturbing.

From one week of logs, we were able to attach a timestamp to 15,000 records. Each time Ton’s phone made a connection with a communications tower and each time he sent an e-mail or visited a website, we could see when this occurred and where he was at that moment, down to a few metres. We were able to infer a social network based on his phone and e-mail traffic. Using his browser data, we were able to see the sites he visited and the searches he made. And we could see the subject, sender and recipient of every one of his e-mails.

So what can we find out about him from just that information? A lot. Far more than any government should know about the average citizen. Take a look:

Continue reading “Metadata: The Map to Your Life and Operations”