Instruction from DJ Shipley, founder of GBRS Group and former Tier 1 operator, highlights the critical need for operational security (OPSEC) regarding personal electronic devices. The video emphasizes the ease with which cell phones can be hacked and personal data compromised, especially at events like SHOT Show or during international travel. It advocates for the use of discrete carry methods and specialized RF shielding pouches as effective, low-profile layers of protection against data collection and hacking.
This video demonstrates how easily a Wi-Fi network can be hijacked by creating fake hotspots, leading to potential data theft. The demonstration highlights the risks associated with connecting to unsecured public Wi-Fi networks.
This video by Jason Hanson, an expert in intelligence agency tactics, highlights the significant risk of remote webcam activation for surveillance. He strongly advocates for a simple yet highly effective personal security measure: covering your webcam with tape or a physical cover. This proactive step is presented as a low-effort, high-reward strategy to prevent unauthorized visual access, a concern amplified by the ease with which such surveillance can be conducted by various entities.
This video, featuring former CIA officer Jason Hanson, details the security risks associated with smartphones and advocates for the use of 'burner' phones for enhanced privacy. It outlines strategies for acquiring and using these devices to minimize digital tracking and data collection, emphasizing the importance of secure acquisition methods and the use of Faraday bags for critical situations.
This entry details the UP Phone by Unplugged, a privacy-focused smartphone recommended by former CIA officer Jason Hanson. It highlights advanced security features like a physical battery kill switch, scheduled data resets, a firmware-level firewall with zero data collection, geofencing protection, and an emergency duress PIN. The phone also offers a built-in VPN and supports large local storage via SD card, though it has some app compatibility limitations.
Former CIA officer Jason Hanson shares his personal experiences with data breaches and outlines three key strategies for personal data protection. He emphasizes the importance of freezing credit with major bureaus, utilizing data removal services, and employing VPNs for secure internet access, especially on public Wi-Fi.
This video from Marine X, presented by an individual with high authority in the tactical and preparedness community, analyzes escalating geopolitical tensions between the US, China, and Russia, focusing on potential conflict zones like Venezuela and the Strait of Hormuz. It also details recent domestic threats, including a mass casualty event in New Orleans involving a vehicle ramming and shootout, and a VBIED incident in Las Vegas. The speaker emphasizes increased vigilance during holidays and highlights emerging cyber threats and data privacy concerns.
This video, presented by former CIA officer Jason Hanson, focuses on the UP Phone and its Unplugged OS, designed for enhanced data privacy. The UP Phone strips out all Google Mobile Services tracking, a feature validated by an independent security firm, Raxis. The comparison highlights the significant data packet transmission from iPhones and Android devices versus the UP Phone's zero third-party DNS requests.
This video discusses two critical issues: the sale of personal DMV data by states to third-party corporations like LexisNexis and CARFAX, and the extreme volatility in the silver market, with warnings of a potential derivative meltdown. The speaker, identified as having high authority within the prepper community, advises listeners to secure wealth in physical assets due to exceeding systemic risk levels.
This video, presented with serious and authoritative tone by an expert in legal and policy matters, details the Butte County CCW data leak. It explains the legal framework of the California Public Records Act (CPRA) and the 'public interest balancing test' used to determine record disclosure. The speaker emphasizes the need for transparency in CCW program administration while protecting sensitive personal information of permit holders, referencing the CBS v. Block case and the 2022 DOJ breach. Actionable advice is provided for CCW holders to protect their data.
This content debunks common media misconceptions about defense tech companies like Palantir and Anduril, clarifying they do not spy on private communications. It highlights the operational reality versus public fears, fueled by 'hysteria' and controversial figures like Peter Thiel. Visuals showcase advanced surveillance tech like the Ghost-X drone.
This video exposes how Chinese-made electronics, like Tineco vacuums, can contain hidden spyware. These devices connect to Chinese cloud servers, allowing manufacturers to remotely alter functionality and potentially compromise home networks. The discussion highlights the risks associated with Wi-Fi enabled smart appliances from untrusted sources, labeling them as potential 'attack vectors'.
Gun Laws by State
Read firearms regulations for all 50 states + D.C.
Find Gun Dealers
Search licensed FFL dealers near you.