Monday, January 27, 2020

How to protect yourself from the Wuhan Coronavirus

By Timothy Gamble

How to protect yourself from the Wuhan Coronavirus:

Coronaviruses, including the Wunan Coronavirus, can be spread person-to-person, or through contaminated food or surfaces. This makes avoiding contact with infected or potentially infected people, along with strong hygeine and sanitation practices, extremely important in stopping the spread of the disease.

The CDC and WHO give the following general advice for protecting against Coronaviruses:
  • Wash your hands often, for at least 20 seconds.
  • Avoid touching your eyes, nose, or mouth with unwashed hands. 
  • Avoid contact with thse who are sick.
  • Clean and disinfect all surfaces (click link for disinfectants page on Amazon). 
  • If you are sick, avoid contact with others.
  • Stay home when sick and for two days after symptoms stop.
  •  Do not prepare food for others if you have a
    Coronavirus, or if you may have come into contact with someone with a Coronavirus.
Wearing medical facemasks in public can help prevent catching or spreading Coronaviruses, but simply avoiding infected people and thoroughly washing your hands often are the most effective measures to take.  

Availability of Medical Facemasks:

In the United States, there have been news reports of medical facemasks selling out fast at retailers and on Amazon. My local Wal-mart was sold out last week, but has since restocked. Some facemasks have been restocked and once again available on Amazon. Expect availability to be sporadic as increased news coverage causes increased demand. 
---------------------
https://amzn.to/2vfqczW
AD:  Diversey Virex All Purpose Disinfectant Cleaner - Kills 99.9% of Germs.  Provides broad spectrum kill of microorganisms including HBV, HIV-1, VRE, MRSA, MRSE, VISA, PRSP, Herpes Simplex Types 1&2, Influenza Type A2, Adenovirus, Rotavirus, Norovirus, and many more. Meets OSHA's BloodBorne pathogen standards for HBV and HIV. 


---------------------

Saturday, January 25, 2020

9 Specific Ways to Defend the Second Amendment

***  This 2020 article has been replaced with an updated version with additional information, published Feb.2, 2023. Please read the new article: Ways to Defend the Second Amendment - 23 Action Steps  ***
 

Tuesday, January 21, 2020

Sweden Distributes ‘Prepare for War’ Booklet to All Swedes - Here's What It Advises

By Timothy Gamble (May 22, 2018)

https://www.msb.se/Upload/Forebyggande/Krisberedskap/Krisberedskapsveckan/Fakta%20om%20broschyren%20Om%20krisen%20eller%20Kriget%20kommer/If%20crises%20or%20war%20comes.pdf
Sweden is distributing a "Be Prepared for War" booklet to all 4.8 million Swedish households, urging all Swedes to be prepared for war or other major crisis in the near future. The 20-page booklet, entitled Om krisen eller kriget kommer (English: If Crisis or War Comes), explains how people can secure basic needs such as food, water, heat, and communications, explains what various warning signals mean, when and where to seek bomb shelters, and how to contribute to Sweden’s “total defense," among other topics. 

The reason for the booklet's distribution appears to be Russia's recent repeated violations of Sweden's airspace and territorial waters (which have Sweden seriously considering joining NATO). But there has also been some speculation that the Swedish government may be growing concerned about a possible internal insurrection by Muslim migrants. Whatever the reason, I thought it would be interesting to examine what advice the Swedish government is giving it people. You can download a copy of the English version by clicking here (opens as a .pdf).

The booklet consists of three main parts: a) Emergency Preparedness, emphasizing household preparations, b) Total Defense, explaining military and civil defense, including the duty of Swedish citizen's to contribute to the nations defense, and c) Warning Systems, explaining what various warning signals means, and when/where to find bomb shelters and other safe spaces.

What would you do if your everyday life was turned upside down?  The intro section includes this question, and gives the answer: "In just a short time, your everyday life can become problematic: 
  • The heating stops working. 
  • It becomes difficult to prepare and store food. 
  • The shops may run out of food and other goods. 
  • There is no water coming from the taps or the toilet. 
  • It is not possible to fill up your car. 
  • Payment cards and cash machines do not work. 
  • Mobile networks and the internet do not work. 
  • Public transport and other means of transport are at a standstill. 
  • It becomes difficult to obtain medicines and medical equipment."
Of course, this is only just a short list of the many difficulties that may arise during a war or other major crisis, but the point they are trying to make is that people need to start thinking through the possible ramifications of a societal breakdown for whatever reason. Most folks just aren't ready for the conveniences of modern life to disappear. 


Be on the lookout for false information. The booklet also expresses concern over false information being spread, either through unfounded rumors or as part of intentional misinformation campaigns. It gives this advice: "The best protection against false information and hostile propaganda is to critically appraise the source:
  • Is this factual information or opinion? 
  • What is the aim of this information? 
  • Who has put this out? 
  • Is the source trustworthy? 
  • Is this information available somewhere else?
  • Is this information new or old and why is it out there at this precise moment?"
A big concern about misinformation is that it's "aim may be to reduce our resilience and willingness to defend ourselves." At one point in the booklet, it states: "If Sweden is attacked by another country, we will never give up. All information to the effect that resistance is to cease is false."

Home Preparedness Tips.  The booklet also gives various tips on home preparedness, mainly regarding food, water, warmth, and communications. "Your prerequisites and needs vary, for example, depending on whether you live in the countryside or in a built-up area, in a ho use or in an apartment. Here are some general home preparedness tips.  Use that which is appropriate for you and those close to you. It is a good idea to share certain things and borrow from one another."  It is interesting to see that they suggest cooperation (community) as a survival tactic. Specific recommendations can be found in the booklet if you download a copy, or in the two illustrations below.




The booklet also gives a website, Dinsäkerhet.se, where folks can get more detailed information.  The website isn't in English, but several videos on the website have English subtitles. I'll include these videos below. 

Emergency Preparedness - Food




Emergency Preparedness - Communications

 
 

 Emergency Preparedness - Water



Emergency Preparedness - Warmth


---------------------
  
Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column.

On Social Media:

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics.

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics.

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.
 

Monday, January 20, 2020

Statement on Self-Defense and the Use of Force

By Timothy Gamble

This statement reflects my views on Self-Defense and the Use of Force, prayerfully developed over many years of consideration. I do not seek to prove these views to the reader, but rather hope the reader will investigate the many sources given in the footnotes, should they have questions about why I hold these views. 

For the purposes of the following statement, I define self-defense as "the use of force, including potentially deadly force, as a last resort to protect oneself or others from the threat of imminent harm." This definition therefore excludes the use of force solely for personal gain, or out of a desire for revenge or vengeance. Also notice some key words of that definition - "last resort", "protect", and "imminent harm" - that suggest there are limitations upon the use of force in self-defense. Self-defense is not an excuse for the unlimited use of violence.  


Statement on Self-Defense and the Use of Force

I strongly believe in the unalienable right of self-defense, including the defense of others. It is a biblical concept, which can be proved with numerous passages from both the Old and New Testaments. (see footnotes 1, 2, 3, 4, 8)

I strongly support the Second Amendment. We have the right to possess the tools of self-defense, including guns and knives. (see footnotes 1, 2, 3, 4, 5,)   

I reject retaliation, revenge, and vengeance, because God's Word makes it clear that such belongs to the Lord, not man. (see footnotes 1, 6)

I reject unwise and inappropriate use of force in self-defense. This includes being too quick to anger, and lacking self-control. Defensive force should only be used as a last resort. "Employing potentially lethal force out of anger, hatred, jealously, or revenge is always wrong and is condemned by Scripture." (see footnote 7)

I reject unprovoked aggression (the initiation of force without just cause). Aggression (force) is necessary, and ethical, in some circumstances to protect ourselves (or others) from actions or threats against our lives, freedoms, rights, or property. 

I reject the concept of absolute pacifism (the idea that force should never be used under any circumstances, even in self-defense or defense of others). I consider refusing to help defend those in legitimate need, when you have the ability to do so, to be a potentially immoral and cowardly act, because it suggests that life isn't worth defending.

----------
Footnotes

1) See the website Biblical Self-Defense for a lengthy examination of dozens of Old and New Testament passages on self-defense.

2)
See the article Self-Defense by Fr. John Whiteford on the Orthodox Christianity website. 
 
3) A book on the subject of biblical self-defense that may be of interest is Stand Your Ground: The Biblical Foundation For Self-Defense, by Steve Jones.

4) The article The Six Things Americans Should Know About the Second Amendment, by Richard W. Stevens, contains an examination of self-defense within a Judeo-Christian framework.

5) See The Bill of Rights, particularly the Second Amendment.

6) See the page Revenge and Retaliation on the Knowing Jesus website for 37 verses on retaliation, revenge, and vengeance belonging to God, not people.

7) Quote is from The Biblical View of Self-Defense, on the Biblical Self-Defense website.


8) Watch the five minute video, Do Not Murder, by Dennis Prager. 
 ---------------------

*** Please subscribe by email to Dystopian Survival by clicking here and/or by following me on social media (see full list near top of right-hand column of this website). Thank you!



Trees for Long-Term Survival

By Timothy Gamble (May 11, 2018)

I found this poster, promoting the usefulness of trees for long-term sustainability and survival, on a UK website/blog more than 10 years ago.  The website went dark soon after, and I have no further information on its origins.


I love this poster because it reflects the usefulness and neccessity of trees. It has been said that trees can provide everything that human civilization needs (except for minerals/metals that must be derived from the Earth) to survive indefinately. Watch Patrick Moore's five-minute Prager Univesity video Trees Are The Answer for more on the usefulness of trees. Even though I am far from a liberal "tree-hugger," I've long promoted within the survivalist community the usefullness of trees. 

My Forest Gardening series of articles published on my website have been quite well-received. If you don't know what Forest Gardening is, check out my Introduction to Forest Gardening. Its a concept for preppers, survivalists, and homesteaders to seriously consider. Even if you don't want to get into Forest Gardening (it does take a lot of work and time to set-up), I hope you will at least plant a few fruit or nut trees on your property. My receent article Tips For Planting Fruit Trres & Common Mistakes will help guide you through this process.  
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.  

Saturday, January 18, 2020

Reclaiming Masculinity - Teach Your Sons

By Timothy Gamble

There is a crisis in America and the West today, and it has nothing to do with so-called "toxic masculinity" - a fake, misleading term that actually describes the lack of traditional masculinity in most men these days. This lack of masculinity has lead to the breakdown in marriage and family, leading to many of modern society's problems. A reclaiming of traditional masculinity is needed to successfully address those problems. But how do we reclaim traditional masculinity? 

First, we must stop treating masculinity as bad. The ideal of masculinity used to be one of faith, courage, strength, integrity, leadership, responsibility, discipline, and self-reliance. That ideal has been dismissed, ridiculed, and actively discouraged for generations now, mocked as somehow "toxic." Today, boys are treated as broken girls, needing to be cured of their natural masculinity. This must stop. We must once again embrace and teach to our boys (and ourselves, frankly) the very positive aspects of traditional masculinity. In this article, I want to suggest one resource that may help.
 
https://amzn.to/34EjuQX
The Daniel Boone television series from the late 1950s and early 1960s, starring Fess Parker, is a fantastic resource for learning about positive traditional masculinity.  Not the weak, selfish, bumbling mockery of manhood typically depicted on TV today, Daniel Boone is portrayed as a real American hero, and a man of faith, courage, and integrity. Steadfast in his love for his wife and son, Boone is looked up to as a protector, provider, and leader of both his family and his community.  He is definitely shown as being a man strong of character, will, and determination, who doesn't give up or run away when the going gets tough.  

Not only is Daniel Boone a good role model of real masculinity, but there are many moments in the series in which Boone teaches his son, Israel, various life lessons as he guides him towards manhood. Throughout the series, Boone faces many challenges and dilemmas, which he overcomes with faith, wisdom, hard work, and strength, without compromising his values and beliefs. These situations provide excellent opportunities for men to engage in discussions with their sons. 

https://amzn.to/34EjuQXUnlike current television, there is no political correctness or leftist ideology marring Daniel Boone. Guns are shown in a positive light - as tools of protection and provision. There are no sex scenes and no mocking of Christianity or traditional values. Also, there are no LGBT characters or agenda, unlike most current shows and movies. I suggest all Fathers watch this series with their sons. (And, yes, Mothers and daughters can watch this, too, so no fake outrage please.) The Inspiration Network (INSP) airs the series a couple of times a week, usually in the very early morning hours (2 or 3 am) on Sunday, so check your local times and set your DVR. The entire series is also available on DVD from Amazon.

You may also be interested in my previous article in this series Reclaiming Masculinity - Skills Every Real Man Should Have.
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.   

Thursday, January 16, 2020

Operational Security (OPSEC) - Part 3: Countermeasures

By Timothy Gamble (April 11, 2018)

This is part 3 of my Operational Security (OPSEC) article. Part one defined operational security and described the five-step process used in OPSEC. Part two gave a practical example of how millions are unintentionally revealing critical information. This final part gives practical tips and countermeasures folks can take to protect their information. 

Tips and Countermeasures

1- The first and most important part of protecting your critical information is to make sure that everyone in your family/group understands what information to protect. You cannot do OPSEC without clearly defining to everyone involved what critical information needs to be protected. See Part one for the five-step process to accomplish this goal.

2- Next, make a thorough and honest assessment of all the possible ways you are leaking critical information, especially to the bad guys who are actively looking for it and start taking countermeasures.

3- Public, and even private, conversations, can be overheard. Be aware of your surroundings and topics of conversations. Even off-hand remarks can reveal critical information. Make sure your conversations are really private before discussing critical information. 

4- Be aware how certain information may reveal other information. For example, that "First Baptist Church" bumper sticker reveals not only your church membership, but also tells the bad guys you're probably not at home on Sunday mornings.Think through what the bad guys may able able to deduce from seemingly innocent information you do give out. 

5- Shred/burn (instead of throwing away) all unneeded paper that may reveal critical information, including bills, shopping receipts, insurance papers, bank statements, tax records, pay stubs, ATM receipts  & other financial documents, pre-approved credit card & loan applications, prescription labels & info, expired passports and driver's licenses, among many others. A good article on what to keep and how long is How Long to Keep Documents & What to Shred by Elizabeth Larkin.  


The general rule is anything with the following information should be shred: account numbers, birth dates, maiden names, passwords and pins, signatures, and social security numbers." -- Elizabeth Larkin

6- Children, especially young children, tell EVERYTHING to their friends, schoolmates, teachers, neighbors, and other parents (even if you've told them not to). Be especially aware of what you reveal to them, and remember that they do have ears and overhear a lot more than you might think. Remind them often that privacy is important and that they shouldn't share certain information with others. There have been many news stories in recent years of schools quizzing students about their home life, including asking about topics such as the parent's political views and if there are guns in the home. Tell your kids to answer "I don't know, you'll have to ask mommy and daddy about that" and to tell you who was asking those type questions. Review this with them often (they quickly forget).

7- careful of what trash & recyclables you leave at the curb. Even empty boxes may reveal to those nosy neighbors what, and how much, you are buying. Options to roadside recycling include taking the boxes to the recycling center yourself, or even burning them or using them in composting or sheet mulching. Remember to shred/burn critical papers.

8- Be cautious in your use of social media, email, text messaging, and the Internet. Realize that if you are emitting electronically, your use is being monitored, logged and stored. NEVER use electronics to commit illegal acts, make threats, stalk or harass others (you shouldn't be doing these things anyway). When surfing the Internet, avoid the "Red Light Districts" (adult sites, illicit drug sites, or other sites used for illegal/unethical activities), as visiting those sites greatly increases your chances for computer viruses, phishing attacks, ransomware, and attracting the attention of both the bad guys and law enforcement. 

9- Never give away a password to  any account to anyone EVER!!! 

10- Keep all software up-to-date. This is especially true for your anti-virus and firewall software (they stop automatically updating after the free trial period is up), but is also true for your operating system, drivers, etc. Out-of-date software likely have multiple security issues.

11- Rethink your use of social media. Keep only those accounts you really use often or need professionally (I recently deleted my Facebook, Instagram, and Google+ accounts). Avoid oversharing or giving away critical information. Especially avoid giving away your schedule or travel plans (lets the bad guys know when you are not home). Don’t post personal information (real friends already know your workplace, school, home address, phone number, etc.- don’t  broadcast it to strangers).

12- How to Delete a Google+ Account https://www.wikihow.com/Delete-a-Google%2B-Account 

13- How to Download and Delete Your Entire Google Search History http://www.maketecheasier.com/download-delete-goog...

14- How to delete everything Google knows about you https://www.expressvpn.com/internet-privacy/how-to...

16- How to Permanently Delete a Facebook Account https://www.wikihow.com/Permanently-Delete-a-Facebook-Account

17- How to Delete an Instagram Account https://www.wikihow.com/Delete-an-Instagram-Account

18- Want an privacy-sensitive alternative search engine to Google, Yahoo, or Bing? I suggest StartPage https://www.startpage.com/ or Duck-Duck-Go https://duckduckgo.com/

19- Concerned about Microsoft's recent announcement that they will ban "offense language" and begin monitoring private accounts (Office, Skype, and other Microsoft products)? Looking for an alternative to Microsoft Office? I use Apache Open Office https://www.openoffice.org/ Its free and works great!

20- Want a good alternative web browser to Internet Explorer, Microsoft Edge, and Google Chrome?  Try Mozilla Firefox https://www.mozilla.org/en-US/firefox/new/. It can be enhanced with a number of privacy-protecting add-ons, including HTTPS Everywhere and Ghostery, among others (go to the add-ons page after installing Firefox).

21- Delete cookies regularly or disable the use of cookies through your browser. You can “whitelist” cookies from sites you need/trust while still blocking all others. There are also several Firefox add-ons, such as Self-Destructing Cookies, that will do this for you. 

22- Never use the “remember me” function on websites, even from your own laptop or device. 

23- Be mindful of you use of affinity cards, credit/debit/checking cards, and even modern library cards, as they all collect and log data about you and your habits. This information may then be used by the company, shared with its vendors, sold to other companies, or stolen by company employees or outside hackers. It could also be obtained by the government (even without a warrant in many cases). 

Obviously, this list barely scratches the surface of the many countermeasures you can take to keep critical information out of the hands of bad guys and others (corporations, government) who don't need it. My hope is that it will give you plenty of "food for thought" and even many practical ideas for protecting your critical information.
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.     

Wednesday, January 15, 2020

Operational Security (OPSEC) - Part 2: Practical Considerations

By Timothy Gamble (April 3, 2018)

This is part 2 of my Operational Security (OPSEC) article. If you missed part 1, click here to read it

How do the bad guys get our critical information?  The answer is we give it to them, most often without realizing it. For one example of how we might give away our information, take a look at the back-end of the cars in the next parking lot you visit. Chances are that most are covered with bumper stickers, window decals, family stick figures, parking passes, and car magnets that reveal a lot of information to nosy neighbors and potential bad guys.


Take those family stick figures that are so popular today. Folks, justifiably proud of their families, put them on their back windows as representations of their family. But think about what it potentially reveals to bad guys:  number of family members, their sex and approximate ages, even what pets you have. Many of these stick figures often also show the interests of the family: Dad holding a fishing rod, Mom swinging a tennis racket, a young boy holding a baseball bat, an older girl wearing a cheerleader outfit.  And look, the family has two cats, but no dog. The bad guys now have a real good idea of the make up of that family, including many of their interests. 

But it doesn't stop there. That parking sticker reveals where you work. This bumper sticker reveals where you attend church (which, in turn, reveals something about your religious beliefs). Another bumper sticker reveals where your honor student attends school (which, in turn, reveals the general location of where you live). That Bass Masters window decal (along with the stick figure of Dad holding the fishing rod) shows that Dad is really into fishing. And look, there are two car magnets - one a yellow ribbon saying "Support Our Troops" and the other a red, white and blue ribbon saying "God Bless America." Hmmm... This family is patriotic and probably conservative. Bumper stickers and window decals can also reveal political affiliation and ideology, even who we voted for in the last election. Favorite sports teams, causes we support, what groups we belong to, and other interests can also be revealed. Quite a database of private information to put on public display without a second thought.

I'm as guilty of this as anyone. A quick glance at the back of my vehicle reveals a NRA sticker and a GOA sticker, broadcasting to the world that I support the Second Amendment, and am most likely a gun owner and a conservative. The "Freedom From Government" bumper sticker pretty much confirms me as very conservative politically, as does the "Jim DeMint for Senate" sticker. (Wow, that's old. I'm surprised its still readable.) I even have a "Survival Resources" sticker, revealing the fact that I am a survivalist. And the Alumni Association decal reveals my education level, and from what college I graduated. Quite a profile can be built on me by glancing at my vehicle's back end. What do your vehicles say about you?  

Tim, are you really saying we shouldn't have any stickers or decals on our cars? Nope. I'm not saying that at all. What I am saying is that we need to be mindful of what information we are giving away without realizing it. It doesn't matter if the information is being given away on the back of our vehicles, on social media, in our trash, through public conversations, or however. 

I said in part one of this article "The first and most important part of protecting your critical information is to make sure that everyone in your family/group understands what information to protect." If you don't understand what to protect, you're not going to be able to do OPSEC. If you haven't already done this, I highly suggest you sit down with your spouse and/or group members and make a conscious decision about what critical information you want to keep protected. What exactly you consider critical information will depend on your own personal circumstances and concerns, but part one of this article will help you think through this step.

Once you decide what information is critical to protect, then you can examine the back of your vehicle, your use of social media, what paperwork you just toss away without shredding, and other ways you may be giving that information away without realizing it.  Follow this up by taking countermeasures to protect this critical information (part three of this article). 

In closing, I will say that, like most things in life, OPSEC will be about balance. Unless you want to become a hermit on a remote deserted island, it is unrealistic and impossible to perfectly protect every possible scrap of information. The OPSEC process described in part one is designed to help you come up with a realistic plan to protect truly critical information. You have to decide for yourself what information to protect and what steps are reasonable to take given your circumstances. 

As for me, this exercise has made me decide to remove several stickers and decals from my vehicle. I'll keep the NRA and GOA stickers because it is important to me to show my support of the Second Amendment, but the others will be removed today.
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics
. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.    

Tuesday, January 14, 2020

Operational Security (OPSEC) - Part 1: Theory and Overview

By Timothy Gamble (March 31, 2018)

World War II Operational Security poster
The following article is intended as an overview of Operational Security (OPSEC) as it relates to preppers and survivalists. It is a simplified version of the OPSEC training that is provided to the military, national security agencies, government officials, and government contractors. I say simplified for two reasons:
  • I've tried to remove most of the jargon, acronyms, and buzzwords of the military/government training
  • My aim is to protect against  nosy neighbors, local bureaucrats, and everyday criminals, rather than enemy-nations and terrorist organizations.
If you want the flavor of military OPSEC training, I suggest starting with the Operational Security (OPSEC) page of the U.S. Department of Defense Education Activity website.

What is Operational Security?  In two words: Information protection. In more words: Keeping critical information away from those who do not need to know it, or who may seek to use it against you in some way. OPSEC seeks to protect both your privacy and your security. 

The definition begs some questions. What is critical information? Who does, and doesn't. need to know that information? Who may seek to use that information against you, and how? How can you protect that information from those people who shouldn't have it?

OPSEC attempts to answer these questions through a five step process.

1- Identify Critical Information - Answers the questions: What information do we need to protect? What do we want to keep private?What information could be used against us in some way? 

Examples of potentially critical information for preppers and survivalists include financial information, social security numbers, passwords and PINs, medical information, political & religious affiliation, membership in certain organizations (NRA, GOA, OathKeepers, prepper/survivalist groups, tea party groups, etc.), gun ownership, presence of valuable items in the home (guns, gold, silver, cash, tools, electronics, etc.), and purchases of large amounts of food and other supplies. It also may include certain plans (when & where to "bug out", home security measures, personal security measures, etc.). What exactly you consider critical information will depend on your own personal circumstances and concerns.

2- Identify Potential Threats - Answers the question: Who really needs to know this information? Everyone else doesn't need to know this information, and represent a potential threat to abuse or misuse the information, or unwittingly reveal the information to those who might.   


Every neighborhood has at least one Gladys Kravitz.
Examples of potential threats: Identity thieves, criminals, local bureaucrats, school officials, nosy neighbors, and untrustworthy family, friends, co-workers, etc. Even politicians and the government at all levels are potential threats (look at the recent misuse of the IRS and DOJ to go after tea party groups and other political enemies of Obama; doctors being encouraged to ask patients about guns in the home; schools questioning students about their parent's political views, gun ownership, and other private information).

3- Identify Vulnerabilities - Answers the question: How do potential threats get our critical information?  The answer is we give it to them, most often without realizing it. 

Examples of how we give away our critical information:
  • Public conversations can be overheard by anyone nearby.
  • Private conversations can be revealed, accidentally or on-purpose, by anyone involved.
  • Our trash/recyclables can reveal our purchases, financial and medical information, even the supplies we are stockpiling.
  • Nearby neighbors can physically see much of our activities and preparations. 
  • Children, especially young children, tell EVERYTHING to their friends, schoolmates, teachers, neighbors, and other parents (even if you've told them not to).
  • Social media and over-sharing online, even if you are "hiding" behind a screen name or other fake identity (sorry, you are never really hidden online).
  • Smart phones & cell phones  - all calls and texts are logged, and its crazy easy for folks with the technology & know-how to hack or track your phones even when they are in airplane mode or turned off completely.
  • Gmail, hotmail/outlook, yahoo mail, and all other free (and many paid) email services log and archive all email and will cooperate with authorities when asked to provide your information to them. It is also fairly easy to hack into most email accounts.
  • Other technology - affinity cards, credit/debit cards, even modern library cards - log all activity, which is then available to the company (for their use or even resell), government officials with warrants (and sometimes without), and even hackers.
4- Assess the Risks -Answers the questions: What critical information is most important to protect? What threats are the most active? What vulnerabilities are the most likely to reveal critical information?

Not all information is equal. Some critical information is more critical than other critical information - meaning it can more easily or effectively be used against you. Not all threats and vulnerabilities are equal - some are greater than others. Risk assessment involves a subjective analysis of importance of critical information and the likelihood that it can become compromised. Most of the time and effort of OPSEC should be aimed at protecting the most important information against the most realistic threats.

5- Apply Countermeasures - Answers the question: How can the bad guys be stopped from getting our information? This is probably why you came to this article, but you do need to understand all the prior information before you can figure out what countermeasures to take. This is because:

The first and most important part of protecting your critical information is to make sure that everyone in your family/group understands what information to protect. Share this critical information on a "need to know basis" only. Even within your family/group, not everyone needs to know everything. This doesn't mean that you don't trust your family or group members. Rather, the less people that know something, the less chance of it accidentally being revealed. 

If you have children in your family, you need to talk to them about not sharing certain information with non-family members. Teach them to respond to questions, even from teachers and other authority figures, about the family's finances, religion, or politics by responding "I don't know," and "You'll have to ask Mommy or Daddy about that." Young children will need to be reminded of this often. Be careful about what information you share with and around your children (they do have ears).

Additional countermeasures may include:
  • Avoid public conversations or comments about critical information. This includes phone conversations in public. 
  • Shredding/burning of receipts, bills, and documents after they are no longer needed.
  • Be careful of what trash & recyclables you leave at the curb. Even empty boxes may reveal to those nosy neighbors what, and how much. 
  • Cautious use of social media, email, and text messaging. Realize that if you are emitting electronically, your use is being monitored, logged and stored.
  • Wise computer use (no illegal activities; keep your operating system and other programs up-to-date; use firewalls, antivirus, and anti-malware programs; use privacy search engines such as Duck-Duck-Go and StartPage instead of Google, Bing, or Yahoo...). 
  • Always take basic home, office, travel, and personal security precautions.
  • Limit affinity cards. These can be great ways to get special deals, but it comes at the cost of allowing the company to collect information on you. This information may be used by the company, shared with its vendors, sold to other companies, or stolen by company employees or outside hackers. It could also be obtained by the government. 
This list only scratches the surface of the OPSEC countermeasures you can take.  I will expand on this list in several future articles. 
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.    

Tips For Planting Fruit Trres & Common Mistakes

By Timothy Gamble (April 19, 2018)

"The best time to plant a tree is 10 years ago. The next best time is now." -- Japanese Proverb*

I spent part of yesterday planting pear trees on my property. I've planted other fruit trees in the past, with and without success. The following are my tips for planting fruit trees, along with what I consider the mst common mistakes people make.  

Tips for Planting Fruit Trees
  • Dig a hole large enough to hold the entire root ball without the  roots touching the sides of the hole.  Common Mistake: If the roots touch the sides of the hole and bend or wrap around the edge of the hole, then the hole is not big enough. Digging in red clay or rocky soil is difficult and exhausting, and the temptation is to say "good enough" and plant the tree with some of the roots bending at the sides. This is probably the most common mistake many people make when planting trees. 
  • Plant the fruit tree to the proper depth. Plant the tree so that all the roots are covered with dirt without having to mound up the dirt around the tree, but do not cover the spot of the graft union with dirt or mulch. The graft union should be about two inches above the dirt and mulch. Common Mistake: Burying the graft union for dwarf and semi-dwarf trees is another mistake people often make. If the graft union is below soil/mulch level, the scion (the tree grafted onto the root stock) will put out roots and the tree will become a standard size tree. 
  • Loosen the soil for a couple of inches at the bottom of the hole. Compacted soil at the bottom of the hole will be difficult for the roots to grow into.
  • Place the fruit tree in the hole, making sure the roots are not bending or wrapping around. Fill in the hole with good quality top soil, packing it gently with your hands or feet.
  • Staking fruit trees is not absolutely necessary, but is a good idea in most cases to ensure that the tree grows straight. This is especially true in windy areas. 
  • Establish a "weed-free zone" at least three feet in diameter around the young fruit tree. Weeds compete with the fruit trees for water and soil nutrients. Mulching can help control grass and other weeds, but be sure not to cover the graft union with soil or mulch.
  • Most fruit trees  tolerate shade well, but will grow quicker in full sunlight. 
  • Most fruit trees need another tree of the same species, but different variety, to cross-pollinate with in order to produce effectively. Even self-pollinating trees will be more productive with a partner tree.  Common Mistake: Planting only a single tree, or multiple trees of the same variety, will likely result in smaller, or no, yields. (For the record, I planted three pear trees, one each of three varieties - Moonglow, Bartlett, and Ayers.)
  • Most fruit trees should be planted in spring, after the danger of freeze/frost has ended.
  • Give the fruit trees plenty of space to grow by not planting them too close together or to already established trees - 12 to 15 feet apart in most cases.  
  • Thoroughly water newly planted fruit trees, and keep them well-watered for the first few months until they get established. Common Mistake: Letting the soil dry out around a young fruit tree before it gets well-established (takes at least a few months) is a major cause of death of young trees. It is easy to remember watering the first time or two, but it is also easy to forget to keep watering them weeks later.
*The exact origins of this  quote are unknown. It has been attributed as a Chinese proverb, a saying of Confucius, a Japanese proverb, and a Native American proverb, among others. The best time is also given as 20 years, or even 30 years, ago in many quotes. I have a Japanese friend who assures me it is a Japanese proverb, the English translation is I have given above. Regardless, I like the quote and believe it is a timeless truth.  
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.    

Why You Should Include a Cotton Pillowcase In Your Bug-Out Bag

By Timothy Gamble (April 17, 2018)

Here's a piece of gear for your bug-out bag that I rarely hear recommended: a cotton pillowcase. Why a cotton pillowcase? Lightweight and not taking up much space, a cotton pillowcase has a myriad of potential uses in a survival situation.

1- Makes an instant bag for collecting wild edibles, kindling for your fire, or anything else you for which you need a good size bag.

2- Can be used to pre-filter water to remove bugs, leaves, stems, algae, and other rubbish before boiling or otherwise treating it.

3- Can be cut into large (or small) bandages, or fashioned into a sling, for first aid.

4- Can be cut into patches to repair clothing (a small sewing kit is a good idea for a bug-out bag).

5- Can be cut into pieces to use as reusable toilet paper (just boil to clean/disinfect before reusing). 

6- Can be fashioned into a reusable diaper (just boil to clean/disinfect before reusing). 

7- Cotton burns, so it can be used in fire making (it also makes for excellent char cloth).   

8- Can be pressed into use as a dust- or smoke-mask.
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.