In my book “Disappear in 24 Hours” available at http://howto.disappear24.com/ I mentioned the Grab and Go bag that you should always have on your person. To eliminate any confusion, this is not a bugout bag. This needs to be something you can run with and won’t look crazy when you carry it around during your daily life.
We now live in times where the collapse should have happened a long time ago. My inspiration for writing this came 2 days ago when a family member decided to get bent out of shape and tell me they are tired of hearing about gloom and doom that was supposed to happen 5 years ago. I happen to agree…we are 5 years overdue for the quickening in the United States. So continue with your life however you want but keep your grab and go bag with you at all times. This may be all you have when things go wrong. If you can’t get back to your home base for 48 hours you should be able to survive. I have listed what I have in my grab and go bag below. You can add or subtract as you feel but remember rule #1 with a grab and go bag is be able to run a mile with it.
Bottle of water
Multi-tool with a knife on it
Thin Poncho with Hood
I have a gun when it is legal
If I was short on time and had to pick the top 3 it would be water bottle, Poncho, and cigarette lighter. The water bottle is an absolute. Even if you don’t prepare yourself after reading this I will just advise you to grab some type of container on your way out the door. You will need hydration after making a quick escape and the adrenaline wears off.
A USA Today reporter who was using wi-fi internet service on a commercial flight recently had his laptop hacked mid-flight. What’s even weirder, the hacker, who was on the same flight with him during the hacking incident, stopped the reporter after the flight and said this:
““That’s how I [hacker] know you’re interested in the Apple story,” he continued. “Imagine if you had been doing a financial transaction. What if you were making a date to see a whore?” My [reporter] mind raced: What about my health records? My legal documents? My Facebook messages?”
We should all be concerned about our privacy. Technology is racing forward and light speed, and our government either doesn’t know how to deal with it or has decided to take advantage of us and make us give up our privacy.
“This tool would be dangerous, whether used by a black hat hacker who might infiltrate Apple systems, a future FBI investigation emboldened by this week’s order to apply the precedent in other less compelling settings, or a dictatorship looking for new ways to oppress people that might cite the company’s compliance with this FBI demand as a reason to comply with those of its own intelligence agencies.” EFF, Shahid Buttar, February 20, 2016.
In the interest of promoting other privacy websites and in the spirit of improving your overall privacy by sharing information, we at privacyliving.com intend to share a new website with you every week or two. This week we present the following privacy blog for your consideration: http://www.privacysurgeon.org/
My favorite suggestion is #4: obtain a low-tech, analog cell phone. Despite the fact that many of the suggestions are both ridiculous and hilarious, this one might actually be a great idea. Yes, all your friends will make fun of you, but you’ll also be the least-trackable person.
The big news right now is the buzz around Apple being ordered by a judge to help the government break into an Apple phone belonging to a terror suspect. This is not a new battle. What many stories will leave off is that this battle has been going on between the federal government and Apple for years now. The government was furious when the “unbreakable” encryption came out and has been trying to get Apple to give them a back door ever since. To put it in no uncertain terms, the government wants an access point to spy on anybody who has an Apple device if the government finds the need to spy on that person.
So far Apple has held its ground but don’t be so sure. They could fold at any time but they are in a very precarious position. On one hand Apple has the chance to follow the court order and assist in the break in of a terrorist’s phone which would be a great thing……But at what cost? Personal privacy is on the line here. Once law enforcement gets that encryption for the one phone do you really think it will stop there? It will not. Once this phone belonging to the terrorist is broken into, the encryption that millions have relied upon to keep their personal data safe will be toast! This will first start being used in some other high profile cases that look good to the public. Perhaps a murder, or a violent robbery will get solved. Then the hack will find its way into local police stations around the country.
Somewhere along the way thieves and criminals will start stealing data and bank information from unsuspecting victims. Keep in mind that the victims are part of the 90% idiots in the world that probably don’t even know this story exists and probably wouldn’t believe it if you told them. These poor fools are going to have their bank accounts looted and their identities stolen by hackers and then it’s all going to be used to pay for more global terrorism. This is why the phone situation should be left alone.
As always, I want to give you the best piece of advice I can offer: Don’t do anything on an electronic device that you wouldn’t want to explain on national television or to a jury. Apple may cave and give it all up. This may hurt their street cred but with the right amount of pressure from the government they will drop the dime. They may also try to save face and send the government a helper that has recently “resigned” from the company. NEVER EVER EVER PUT YOUR FAITH IN THE SECURITY OF AN ELECTRONIC DEVICE. You will be disappointed.
It seems that the term “Active Shooter” is now a common and unfortunate term in our society. Madmen and terrorists have taken advantage of our open and trusting society, twisting our 2nd amendment rights for their perverted intent on causing murder and mayhem with mass shootings. Where will this lead our society? Now more than ever, law abiding citizens need to stay vigilant and be prepared to protect themselves and their families.
The four things you must consider in an Active Shooter scenario:
1. GET OUT!!!
Keep your Situational Awareness (SA) and find an exit – Try not to draw attention to yourself. Don’t move to an exit where the shooter is focused on. Look for a window, door, primary and alternate, tertiary routes out. If you are with someone you know, take charge!!! Lead them away from the danger.
Check out the latest privacy issue regarding cash in Arnold Schwarzenegger’s home country of Austria. What a novel idea!
“Austrians should have the constitutional right to use cash to protect their privacy, Deputy Economy Minister Harald Mahrer said, as the European Union considers curbing the use of banknotes and coins.
“We don’t want someone to be able to track digitally what we buy, eat and drink, what books we read and what movies we watch,” Mahrer said on Austrian public radio station Oe1. “We will fight everywhere against rules” including caps on cash purchases, he said.” – Bloomberg News
No one should ever think it’s okay to allow themselves to be tracked, monitored or spied upon. Freedom to communicate, share and congregate are inalienable rights which were enshrined in our Bill of Rights by our Forefathers here in the USA.
An interesting side note: It should also be noted that the Austrian School of Economics was founded in 1871. Many of it’s ideas which fly in the face of the modern Keynesian ideas of spend and borrow the way out of debt and economic crisis are still alive and well in the Libertarian mind. Liberty and Freedom live!
It’s sad to say, but ideas that once were exclusive to the US, such as freedom and liberty, now flourish in a bigger way in burgeoning countries across the world.
In late 2015, Edward Snowden discussed cell phone privacy with BBC in a candid interview.
“Snowden says: “They want to own your phone instead of you.” It sounds very much like he means we are being purposefully encouraged to buy our own tracking devices. That kinda saved the government some money, didn’t it?” – BBC
We think this interview is worth a watch. Some of the details of how you are being spied on may surprise you. For instance, some of the technologies used to spy on your phone are named after Smurfs. Yes, you heard correct – SMURFS.
“these technologies are very disturbing; each one is built to spy on you in a different way:
“Dreamy Smurf”: lets the phone be powered on and off
“Nosey Smurf”:lets spies turn the microphone on and listen in on users, even if the phone itself is turned off
“Tracker Smurf”:a geo-location tool which allows [GCHQ] to follow you with a greater precision than you would get from the typical triangulation of cellphone towers.
“Paranoid Smurf”: hides the fact that it has taken control of the phone. The tool will stop people from recognising that the phone has been tampered with if it is taken in for a service, for instance.” – BBC Snowden Interview
And there are things you can do to prevent this. Immediate things you can do to make yourself more private:
Change your privacy settings so that your phone is not allowing tracking
Turn the phone off when not in use.
Purchase a cell phone case that blocks signals, when not in use (like a block-it pocket).
Add a password to your phone.
Don’t let others use your phone and don’t leave the phone where others might access it.
Download privacy apps for your phone that allow for encryption.