EMP Testing Video and Faraday Cages

The video speaks for itself, but I’d like to add a little to it – for the thick-skulled among us.

A “Faraday Cage” works by redirecting a current around whatever is put inside it. The mesh commonly used does this nicely. The electrical current flows around the cage on it outer surface. What gets me charged up is how so many people assume that a mesh cage will protect its contents from an EMP.

It won’t.

The energy produced by

Continue reading EMP Testing Video and Faraday Cages

The Drone Wars - Data Thieves

In others articles we’ve published, we shared with you the existence of data-stealing technology mounted on drones. The most common of all communications methods used at fixed locations is a WiFi network. With specialized equipment, Data Thieving Drones can hack into your communications stream and see all that you see. Add to that, Persistent Perch capability, and a network spook can nab your bits and bytes for a very long length of time.

Defending against these things is a wide

Continue reading The Drone Wars – Data Thieves

SmartPhone Preps /Apps - Guest Post from Jerry D Young

My thoughts on Smartphone Preps from a presentation I did for one of the local prep groups I am with.

This presentation is based on my experiences with the Samsung Galaxy S 4 Android Smartphone. The concepts and ideas will relate to other Android and Apple electronic platforms, but specifics will be different depending on the capability of the individual phone and which carrier is being used.

In no way do I want to imply that you depend solely on

Continue reading SmartPhone Preps /Apps – Guest Post from Jerry D Young

Seems Data-Thieves cracked WPA-2

The most secure of personal wireless security password protocols has been hacked. WPA-2, the best choice for general home wireless network security, seems to have been cut to pieces. In this article by phys.org, we read:

Now, a new study published in the International Journal of Information and Computer Security, reveals that one of the previously strongest wireless security systems, Wi-Fi protected access 2 (WPA2) can also be easily broken into on wireless local area networks (WLANs). The researchers have

Continue reading Seems Data-Thieves cracked WPA-2

Data-Thieving Drones

And you thought only the NSA was snooping at your window. Forget, for the moment, the

Picture from heliguy.com

drone /UAV aspect of this story. Consider that the technology for hacking your Wi-Fi network exists in great abundance, and data-thieves everywhere would love to get a peek at your network data streams. Imagine a world where the guy a few booths over inside your favorite coffee hangout is a thief. His pal behind you, too. It isn’t enough that

Continue reading Data-Thieving Drones

US to Give Up Control of the Internet

Or, will give up what control it has left.

I remember the days of slow dial-up network access with fondness on one level – a private network. When Prodigy and Promenade were pretty much the big guys as far as inter-connectivity among the masses. You became a member, and then could network with people anywhere on the system. Promenade later became America Online, or AOL. Each system had its own closed network, services, communities, downloads games and chatrooms. It was

Continue reading US to Give Up Control of the Internet

50 Page Catalog of Equipment and Techniques for Government Hackers

Copied it full from ZeroHedge. If the ZeroHedgers have an issue with it, I’ll remove it.

Submitted by Tyler Durden on 12/29/2013 15:39 -0500

The NSA’s 50-Page Catalog Of Back Door Penetration Techniques Revealed

While the world may have become habituated to (and perhaps revels in, thank you social media exhibitionist culture) the fact that the NSA is watching anyone and everyone, intercepting, recording, and hacking every electronic exchange regardless if it involves foreign “terrorists” or US housewives, the discoveries

Continue reading 50 Page Catalog of Equipment and Techniques for Government Hackers

The Mom Song

For you ladies…

What a Mom says in 24 hours condensed into 2 minutes 55 seconds and sung to the William Tell Overture. Absolutely amazing and spot on. I couldn’t believe I was hearing it!

What does this have to do with survivalism? Well, ask any MOM that cares for the household. Survival is an everyday affair!!

Going to M.A.R.S.?

Came across the Military Auxiliary Radio System today. It serves as an amateur radio extension /backup to worldwide military communications missions. MARS is assigned to United States Army Network Enterprise Technology Command (NETCOM). With over 5,000 members currently, it works to backup official military communications during emergencies and crisis.

Sounds like fun! I discovered it while over at the TACDA site, looking at Civil Defense organization and education resources. Amateur radio operators can use their skills to help the nation

Continue reading Going to M.A.R.S.?

EMP Methods and Preps - Part III

For previous parts of this series, see:

EMP Methods and Preps – Part I

EMP Methods and Preps – Part II

In the first two parts of this series, I laid out why I believe the threat of an EMP attack on the United States is both possible, and feasible. The returns to the attacker far outweigh his investment in time, technology and the sacrifices among his personnel. I described how certain advances in technology and materials allow attackers to

Continue reading EMP Methods and Preps – Part III

Monthly Archives