This video, featuring former CIA officer Jason Hanson, outlines critical techniques for vanishing without a trace, emphasizing the absolute avoidance of contact with family. Hanson, who trains individuals in intelligence operative methods, stresses that any communication, even via burner phones, can compromise one's location due to government and other motivated threats monitoring family members' calls. The core advice is to cease all technology use for a true disappearance.
This video from D'Boss Firearms tests the efficacy of using an umbrella to conceal a heat signature. Using a Nocpix Vista S50R thermal monocular, the instructor demonstrates that an umbrella is largely ineffective at hiding a person's thermal presence, even when employing various color palettes. The test highlights the capabilities of modern thermal imaging technology.
This video, featuring former CIA officer Jason Hanson, details the security risks associated with smartphones and advocates for the use of 'burner' phones for enhanced privacy. It outlines strategies for acquiring and using these devices to minimize digital tracking and data collection, emphasizing the importance of secure acquisition methods and the use of Faraday bags for critical situations.
This entry details intelligence gathering and personal safety strategies as explained by former CIA officer Jason Hanson. It covers asset recruitment, intelligence verification, establishing a 'pattern of life' for surveillance, and methods for counter-surveillance by varying routines. The information is presented from an expert perspective on intelligence operations and their application to personal security.
Former CIA Officer Jason Hanson details three methods criminals use for surveillance: 'Bumper Lock' (overt, aggressive), 'Discreet Not to Lose' (maintains distance but takes risks), and 'Discreet to Lose' (most dangerous, blends in). He stresses the importance of situational awareness, especially when leaving work or shopping, and recommends using a Surveillance Detection Route (SDR) by making turns or driving around the block to identify followers.
Former CIA Officer Jason Hanson details practical, low-tech methods for detecting unauthorized entry into hotel rooms. Techniques include precise luggage zipper positioning, item stacking with visual alignment cues, and using 'dummy cash' or small objects as tamper indicators. The advice emphasizes securing high-value items separately and using these methods to confirm surveillance.
This review by former CIA Officer Jason Hanson focuses on the UP Phone by Unplugged as a privacy-centric smartphone alternative. It highlights key security features like a physical battery kill switch, a Duress PIN for data wiping, a custom OS without Google services, and a firmware-level firewall. The phone aims to prevent tracking and data harvesting, offering a stark contrast to conventional smartphones.
This video discusses the concept of 'passive aiming' in a tactical context, particularly relevant when adversaries possess similar advanced optics and sensors. It explains that passive aiming involves deliberately reducing one's own visual or infrared signature (e.g., by staying 'dark') to avoid detection, trading immediate clarity for the advantage of denying information to the opponent. The description emphasizes that this is a strategic choice, not a default mode, and active emissions are superior when speed, identification, or coordination are paramount. The core message revolves around intentionality: understanding the threat, their detection capabilities, and choosing the appropriate operational mode for force protection and mission success.
Shawn Ryan introduces Glacier's 'Black Phone,' a hardened iPhone designed for extreme security and privacy. It offers features like all-American VPNs, burner numbers for any area code, and Pegasus spyware detection. A more affordable consumer version is planned, making advanced secure communication accessible.
This video features an ex-CIA officer explaining methods to detect surveillance. While the title suggests a topic relevant to personal security and situational awareness, it does not explicitly mention any firearms, calibers, manufacturers, or specific firearm-related applications. Therefore, the tags will focus on the core topic of surveillance detection and security.
This video features an ex-CIA operative discussing a critical mistake that can lead to individuals being tracked. While the exact methods or technologies are not detailed in the provided title and description, the focus is on surveillance and operational security. The content likely offers insights into how personal information or movements can be compromised, drawing on the speaker's intelligence background.
This video focuses on a time-sensitive search for hidden cameras within an RV, with the creator aiming to find five within a 15-minute window. The title suggests a shocking discovery was made during this process. The description also includes promotional links to other videos, playlists, a tactical backpack, a Patreon community, a tomahawk, a self-defense blade, a water filter, and a rescue knife. The creator identifies as Jason Hanson, a former CIA officer and author, whose company offers training in various defensive and escape/evasion techniques, including firearms and home defense.
Gun Laws by State
Read firearms regulations for all 50 states + D.C.
Find Gun Dealers
Search licensed FFL dealers near you.