Electronic Family Protection: Part One, by Crusoe

As I continue to digest the lessons from GroundRod I & II there are several key takeaways that are accessible and do not require a ton of “techie knowledge.”  Some of it may still pop some melons, but with a little bit of personal follow-on research the fuzziness can become a little clearer.

Build a life model that incorporates personal security, anonymity, and privacy.  If you add the “convenience” factor it most definitely impacts all three.  Looking at your personal threat model you must decide what is most important to you.  I am a proponent of staying below the ‘cut line’ and trying to blend into the noise and clutter as much as possible.  It should be as clear as day that tensions between both sides of the aisle are at an all-time high and it is just a matter of time before it all boils over.

Source a messaging app with end-to-end encryption.  Stock messaging apps are not private.  Signal and Wire are a step up from iMessage…Session is a ton better.  Scout has mentioned this repeatedly in articles and on Radio Contra.  Pattern of Life is a real thing and if you establish a benign predictable pattern, you then have more room for maneuverability.

Get off Apple mail and never use anything google.  Like never ever unless you absolutely must.  Those companies make money off selling your data.  There are many more secure email services that are worth your investigation.

Here are two:

Remember, even with using end to end encryption in an electronic format never say anything you are not willing to repeat in court.  As noted in the Daniel Perry trial unscrupulous communist DA’s will go through your social media and messaging history.

Use a privacy minded web browser….Brave is a decent one.

  • Be extremely careful with social media and posting where you are at, with who, and what time. People are crazy and nefarious folks will absolutely build a pattern if they wish you harm.  Operate on a “zero trust” model.  Everything contains metadata.  In today’s world acting with a little paranoia is helpful.

Former NSA General Counsel Stewart Baker stated, metadata absolutely tells you everything about somebody’s life. If you have enough metadata, you don’t really need content.”

  • protect every piece of identifiable information. SSN, phone numbers, address, DOB, etc…. No business needs to know any of this.

-If not actively using, turn your Bluetooth and WIFI off on your phone and other electronic devices (under settings on an iphone).  This is a very easy attack surface and point of exploitation.

-Never connect to public WIFI….like never ever ever.  K from Combat Studies Group sells a travel router that you can use to set up a repeater.  More on that in a follow on article.

-Source a RFID blocking wallet to protect your credit cards or identification that uses an RFID chip.

This is the one I purchased.

-Any piece of trash that has words on it (to include junk mail) does not go in the trash but is burned or shredded.  I know it sounds a bit off the deep end but if you think about it I can build a very solid picture of who you are just based off your trash.  Gun magazines, personal data, medications, political leanings, funky diet plans, etc…  It is the first step in find out who you are.  This is a common law enforcement tactic, and I would expect our named adversaries are doing the same.

Zero Trust!


Crusoe is retired from the Air Force after 30-years of service as a flight crew member.  He spends most of his time thinking about the apocalypse and how to mitigate its effects.  When not immersed in academic pursuits, he is often on a trail hiking in the mountains of North Georgia or reading with a glass of Irish whiskey and a German Shepherd by his side.   Global travel enthusiast, history nerd, Appalachian Trail thru hiker, and recovering ultra-endurance athlete.  He can be reached at [email protected]

 

 

 

Share This Story, Choose Your Platform!

About the Author: Patriotman

Patriotman currently ekes out a survivalist lifestyle in a suburban northeastern state as best as he can. He has varied experience in political science, public policy, biological sciences, and higher education. Proudly Catholic and an Eagle Scout, he has no military experience and thus offers a relatable perspective for the average suburban prepper who is preparing for troubled times on the horizon with less than ideal teams and in less than ideal locations. Brushbeater Store Page: http://bit.ly/BrushbeaterStore

2 Comments

  1. Raccoon April 12, 2023 at 09:15

    Awesome! Can’t wait for part 2 ! People need to be doing this .

  2. Ghostmann April 13, 2023 at 07:10

    Browser wise, Mullvad in a joint project with the TOR project has released a new browser with their add on pre-installed. So if you have Mullvad VPN, you can then route it through the proxy with a significantly hardened browser.

    Mullvad VPN has also recently introduced quantum resistant tunnels.

Comments are closed.

GUNS N GEAR

Categories

Archives