Monday, January 27, 2020

How to protect yourself from the Wuhan Coronavirus

By Timothy Gamble

How to protect yourself from the Wuhan Coronavirus:

Coronaviruses, including the Wunan Coronavirus, can be spread person-to-person, or through contaminated food or surfaces. This makes avoiding contact with infected or potentially infected people, along with strong hygeine and sanitation practices, extremely important in stopping the spread of the disease.

The CDC and WHO give the following general advice for protecting against Coronaviruses:
  • Wash your hands often, for at least 20 seconds.
  • Avoid touching your eyes, nose, or mouth with unwashed hands. 
  • Avoid contact with thse who are sick.
  • Clean and disinfect all surfaces (click link for disinfectants page on Amazon). 
  • If you are sick, avoid contact with others.
  • Stay home when sick and for two days after symptoms stop.
  •  Do not prepare food for others if you have a
    Coronavirus, or if you may have come into contact with someone with a Coronavirus.
Wearing medical facemasks in public can help prevent catching or spreading Coronaviruses, but simply avoiding infected people and thoroughly washing your hands often are the most effective measures to take.  

Availability of Medical Facemasks:

In the United States, there have been news reports of medical facemasks selling out fast at retailers and on Amazon. My local Wal-mart was sold out last week, but has since restocked. Some facemasks have been restocked and once again available on Amazon. Expect availability to be sporadic as increased news coverage causes increased demand. 
---------------------
https://amzn.to/2vfqczW
AD:  Diversey Virex All Purpose Disinfectant Cleaner - Kills 99.9% of Germs.  Provides broad spectrum kill of microorganisms including HBV, HIV-1, VRE, MRSA, MRSE, VISA, PRSP, Herpes Simplex Types 1&2, Influenza Type A2, Adenovirus, Rotavirus, Norovirus, and many more. Meets OSHA's BloodBorne pathogen standards for HBV and HIV. 


---------------------

Saturday, January 25, 2020

9 Specific Ways to Defend the Second Amendment

***  This 2020 article has been replaced with an updated version with additional information, published Feb.2, 2023. Please read the new article: Ways to Defend the Second Amendment - 23 Action Steps  ***
 

Tuesday, January 21, 2020

Sweden Distributes ‘Prepare for War’ Booklet to All Swedes - Here's What It Advises

By Timothy Gamble (May 22, 2018)

https://www.msb.se/Upload/Forebyggande/Krisberedskap/Krisberedskapsveckan/Fakta%20om%20broschyren%20Om%20krisen%20eller%20Kriget%20kommer/If%20crises%20or%20war%20comes.pdf
Sweden is distributing a "Be Prepared for War" booklet to all 4.8 million Swedish households, urging all Swedes to be prepared for war or other major crisis in the near future. The 20-page booklet, entitled Om krisen eller kriget kommer (English: If Crisis or War Comes), explains how people can secure basic needs such as food, water, heat, and communications, explains what various warning signals mean, when and where to seek bomb shelters, and how to contribute to Sweden’s “total defense," among other topics. 

The reason for the booklet's distribution appears to be Russia's recent repeated violations of Sweden's airspace and territorial waters (which have Sweden seriously considering joining NATO). But there has also been some speculation that the Swedish government may be growing concerned about a possible internal insurrection by Muslim migrants. Whatever the reason, I thought it would be interesting to examine what advice the Swedish government is giving it people. You can download a copy of the English version by clicking here (opens as a .pdf).

The booklet consists of three main parts: a) Emergency Preparedness, emphasizing household preparations, b) Total Defense, explaining military and civil defense, including the duty of Swedish citizen's to contribute to the nations defense, and c) Warning Systems, explaining what various warning signals means, and when/where to find bomb shelters and other safe spaces.

What would you do if your everyday life was turned upside down?  The intro section includes this question, and gives the answer: "In just a short time, your everyday life can become problematic: 
  • The heating stops working. 
  • It becomes difficult to prepare and store food. 
  • The shops may run out of food and other goods. 
  • There is no water coming from the taps or the toilet. 
  • It is not possible to fill up your car. 
  • Payment cards and cash machines do not work. 
  • Mobile networks and the internet do not work. 
  • Public transport and other means of transport are at a standstill. 
  • It becomes difficult to obtain medicines and medical equipment."
Of course, this is only just a short list of the many difficulties that may arise during a war or other major crisis, but the point they are trying to make is that people need to start thinking through the possible ramifications of a societal breakdown for whatever reason. Most folks just aren't ready for the conveniences of modern life to disappear. 


Be on the lookout for false information. The booklet also expresses concern over false information being spread, either through unfounded rumors or as part of intentional misinformation campaigns. It gives this advice: "The best protection against false information and hostile propaganda is to critically appraise the source:
  • Is this factual information or opinion? 
  • What is the aim of this information? 
  • Who has put this out? 
  • Is the source trustworthy? 
  • Is this information available somewhere else?
  • Is this information new or old and why is it out there at this precise moment?"
A big concern about misinformation is that it's "aim may be to reduce our resilience and willingness to defend ourselves." At one point in the booklet, it states: "If Sweden is attacked by another country, we will never give up. All information to the effect that resistance is to cease is false."

Home Preparedness Tips.  The booklet also gives various tips on home preparedness, mainly regarding food, water, warmth, and communications. "Your prerequisites and needs vary, for example, depending on whether you live in the countryside or in a built-up area, in a ho use or in an apartment. Here are some general home preparedness tips.  Use that which is appropriate for you and those close to you. It is a good idea to share certain things and borrow from one another."  It is interesting to see that they suggest cooperation (community) as a survival tactic. Specific recommendations can be found in the booklet if you download a copy, or in the two illustrations below.




The booklet also gives a website, Dinsäkerhet.se, where folks can get more detailed information.  The website isn't in English, but several videos on the website have English subtitles. I'll include these videos below. 

Emergency Preparedness - Food




Emergency Preparedness - Communications

 
 

 Emergency Preparedness - Water



Emergency Preparedness - Warmth


---------------------
  
Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column.

On Social Media:

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics.

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics.

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.
 

Monday, January 20, 2020

Statement on Self-Defense and the Use of Force

By Timothy Gamble

This statement reflects my views on Self-Defense and the Use of Force, prayerfully developed over many years of consideration. I do not seek to prove these views to the reader, but rather hope the reader will investigate the many sources given in the footnotes, should they have questions about why I hold these views. 

For the purposes of the following statement, I define self-defense as "the use of force, including potentially deadly force, as a last resort to protect oneself or others from the threat of imminent harm." This definition therefore excludes the use of force solely for personal gain, or out of a desire for revenge or vengeance. Also notice some key words of that definition - "last resort", "protect", and "imminent harm" - that suggest there are limitations upon the use of force in self-defense. Self-defense is not an excuse for the unlimited use of violence.  


Statement on Self-Defense and the Use of Force

I strongly believe in the unalienable right of self-defense, including the defense of others. It is a biblical concept, which can be proved with numerous passages from both the Old and New Testaments. (see footnotes 1, 2, 3, 4, 8)

I strongly support the Second Amendment. We have the right to possess the tools of self-defense, including guns and knives. (see footnotes 1, 2, 3, 4, 5,)   

I reject retaliation, revenge, and vengeance, because God's Word makes it clear that such belongs to the Lord, not man. (see footnotes 1, 6)

I reject unwise and inappropriate use of force in self-defense. This includes being too quick to anger, and lacking self-control. Defensive force should only be used as a last resort. "Employing potentially lethal force out of anger, hatred, jealously, or revenge is always wrong and is condemned by Scripture." (see footnote 7)

I reject unprovoked aggression (the initiation of force without just cause). Aggression (force) is necessary, and ethical, in some circumstances to protect ourselves (or others) from actions or threats against our lives, freedoms, rights, or property. 

I reject the concept of absolute pacifism (the idea that force should never be used under any circumstances, even in self-defense or defense of others). I consider refusing to help defend those in legitimate need, when you have the ability to do so, to be a potentially immoral and cowardly act, because it suggests that life isn't worth defending.

----------
Footnotes

1) See the website Biblical Self-Defense for a lengthy examination of dozens of Old and New Testament passages on self-defense.

2)
See the article Self-Defense by Fr. John Whiteford on the Orthodox Christianity website. 
 
3) A book on the subject of biblical self-defense that may be of interest is Stand Your Ground: The Biblical Foundation For Self-Defense, by Steve Jones.

4) The article The Six Things Americans Should Know About the Second Amendment, by Richard W. Stevens, contains an examination of self-defense within a Judeo-Christian framework.

5) See The Bill of Rights, particularly the Second Amendment.

6) See the page Revenge and Retaliation on the Knowing Jesus website for 37 verses on retaliation, revenge, and vengeance belonging to God, not people.

7) Quote is from The Biblical View of Self-Defense, on the Biblical Self-Defense website.


8) Watch the five minute video, Do Not Murder, by Dennis Prager. 
 ---------------------

*** Please subscribe by email to Dystopian Survival by clicking here and/or by following me on social media (see full list near top of right-hand column of this website). Thank you!



Trees for Long-Term Survival

By Timothy Gamble (May 11, 2018)

I found this poster, promoting the usefulness of trees for long-term sustainability and survival, on a UK website/blog more than 10 years ago.  The website went dark soon after, and I have no further information on its origins.


I love this poster because it reflects the usefulness and neccessity of trees. It has been said that trees can provide everything that human civilization needs (except for minerals/metals that must be derived from the Earth) to survive indefinately. Watch Patrick Moore's five-minute Prager Univesity video Trees Are The Answer for more on the usefulness of trees. Even though I am far from a liberal "tree-hugger," I've long promoted within the survivalist community the usefullness of trees. 

My Forest Gardening series of articles published on my website have been quite well-received. If you don't know what Forest Gardening is, check out my Introduction to Forest Gardening. Its a concept for preppers, survivalists, and homesteaders to seriously consider. Even if you don't want to get into Forest Gardening (it does take a lot of work and time to set-up), I hope you will at least plant a few fruit or nut trees on your property. My receent article Tips For Planting Fruit Trres & Common Mistakes will help guide you through this process.  
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.  

Saturday, January 18, 2020

Reclaiming Masculinity - Teach Your Sons

By Timothy Gamble

There is a crisis in America and the West today, and it has nothing to do with so-called "toxic masculinity" - a fake, misleading term that actually describes the lack of traditional masculinity in most men these days. This lack of masculinity has lead to the breakdown in marriage and family, leading to many of modern society's problems. A reclaiming of traditional masculinity is needed to successfully address those problems. But how do we reclaim traditional masculinity? 

First, we must stop treating masculinity as bad. The ideal of masculinity used to be one of faith, courage, strength, integrity, leadership, responsibility, discipline, and self-reliance. That ideal has been dismissed, ridiculed, and actively discouraged for generations now, mocked as somehow "toxic." Today, boys are treated as broken girls, needing to be cured of their natural masculinity. This must stop. We must once again embrace and teach to our boys (and ourselves, frankly) the very positive aspects of traditional masculinity. In this article, I want to suggest one resource that may help.
 
https://amzn.to/34EjuQX
The Daniel Boone television series from the late 1950s and early 1960s, starring Fess Parker, is a fantastic resource for learning about positive traditional masculinity.  Not the weak, selfish, bumbling mockery of manhood typically depicted on TV today, Daniel Boone is portrayed as a real American hero, and a man of faith, courage, and integrity. Steadfast in his love for his wife and son, Boone is looked up to as a protector, provider, and leader of both his family and his community.  He is definitely shown as being a man strong of character, will, and determination, who doesn't give up or run away when the going gets tough.  

Not only is Daniel Boone a good role model of real masculinity, but there are many moments in the series in which Boone teaches his son, Israel, various life lessons as he guides him towards manhood. Throughout the series, Boone faces many challenges and dilemmas, which he overcomes with faith, wisdom, hard work, and strength, without compromising his values and beliefs. These situations provide excellent opportunities for men to engage in discussions with their sons. 

https://amzn.to/34EjuQXUnlike current television, there is no political correctness or leftist ideology marring Daniel Boone. Guns are shown in a positive light - as tools of protection and provision. There are no sex scenes and no mocking of Christianity or traditional values. Also, there are no LGBT characters or agenda, unlike most current shows and movies. I suggest all Fathers watch this series with their sons. (And, yes, Mothers and daughters can watch this, too, so no fake outrage please.) The Inspiration Network (INSP) airs the series a couple of times a week, usually in the very early morning hours (2 or 3 am) on Sunday, so check your local times and set your DVR. The entire series is also available on DVD from Amazon.

You may also be interested in my previous article in this series Reclaiming Masculinity - Skills Every Real Man Should Have.
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.   

Thursday, January 16, 2020

Operational Security (OPSEC) - Part 3: Countermeasures

By Timothy Gamble (April 11, 2018)

This is part 3 of my Operational Security (OPSEC) article. Part one defined operational security and described the five-step process used in OPSEC. Part two gave a practical example of how millions are unintentionally revealing critical information. This final part gives practical tips and countermeasures folks can take to protect their information. 

Tips and Countermeasures

1- The first and most important part of protecting your critical information is to make sure that everyone in your family/group understands what information to protect. You cannot do OPSEC without clearly defining to everyone involved what critical information needs to be protected. See Part one for the five-step process to accomplish this goal.

2- Next, make a thorough and honest assessment of all the possible ways you are leaking critical information, especially to the bad guys who are actively looking for it and start taking countermeasures.

3- Public, and even private, conversations, can be overheard. Be aware of your surroundings and topics of conversations. Even off-hand remarks can reveal critical information. Make sure your conversations are really private before discussing critical information. 

4- Be aware how certain information may reveal other information. For example, that "First Baptist Church" bumper sticker reveals not only your church membership, but also tells the bad guys you're probably not at home on Sunday mornings.Think through what the bad guys may able able to deduce from seemingly innocent information you do give out. 

5- Shred/burn (instead of throwing away) all unneeded paper that may reveal critical information, including bills, shopping receipts, insurance papers, bank statements, tax records, pay stubs, ATM receipts  & other financial documents, pre-approved credit card & loan applications, prescription labels & info, expired passports and driver's licenses, among many others. A good article on what to keep and how long is How Long to Keep Documents & What to Shred by Elizabeth Larkin.  


The general rule is anything with the following information should be shred: account numbers, birth dates, maiden names, passwords and pins, signatures, and social security numbers." -- Elizabeth Larkin

6- Children, especially young children, tell EVERYTHING to their friends, schoolmates, teachers, neighbors, and other parents (even if you've told them not to). Be especially aware of what you reveal to them, and remember that they do have ears and overhear a lot more than you might think. Remind them often that privacy is important and that they shouldn't share certain information with others. There have been many news stories in recent years of schools quizzing students about their home life, including asking about topics such as the parent's political views and if there are guns in the home. Tell your kids to answer "I don't know, you'll have to ask mommy and daddy about that" and to tell you who was asking those type questions. Review this with them often (they quickly forget).

7- careful of what trash & recyclables you leave at the curb. Even empty boxes may reveal to those nosy neighbors what, and how much, you are buying. Options to roadside recycling include taking the boxes to the recycling center yourself, or even burning them or using them in composting or sheet mulching. Remember to shred/burn critical papers.

8- Be cautious in your use of social media, email, text messaging, and the Internet. Realize that if you are emitting electronically, your use is being monitored, logged and stored. NEVER use electronics to commit illegal acts, make threats, stalk or harass others (you shouldn't be doing these things anyway). When surfing the Internet, avoid the "Red Light Districts" (adult sites, illicit drug sites, or other sites used for illegal/unethical activities), as visiting those sites greatly increases your chances for computer viruses, phishing attacks, ransomware, and attracting the attention of both the bad guys and law enforcement. 

9- Never give away a password to  any account to anyone EVER!!! 

10- Keep all software up-to-date. This is especially true for your anti-virus and firewall software (they stop automatically updating after the free trial period is up), but is also true for your operating system, drivers, etc. Out-of-date software likely have multiple security issues.

11- Rethink your use of social media. Keep only those accounts you really use often or need professionally (I recently deleted my Facebook, Instagram, and Google+ accounts). Avoid oversharing or giving away critical information. Especially avoid giving away your schedule or travel plans (lets the bad guys know when you are not home). Don’t post personal information (real friends already know your workplace, school, home address, phone number, etc.- don’t  broadcast it to strangers).

12- How to Delete a Google+ Account https://www.wikihow.com/Delete-a-Google%2B-Account 

13- How to Download and Delete Your Entire Google Search History http://www.maketecheasier.com/download-delete-goog...

14- How to delete everything Google knows about you https://www.expressvpn.com/internet-privacy/how-to...

16- How to Permanently Delete a Facebook Account https://www.wikihow.com/Permanently-Delete-a-Facebook-Account

17- How to Delete an Instagram Account https://www.wikihow.com/Delete-an-Instagram-Account

18- Want an privacy-sensitive alternative search engine to Google, Yahoo, or Bing? I suggest StartPage https://www.startpage.com/ or Duck-Duck-Go https://duckduckgo.com/

19- Concerned about Microsoft's recent announcement that they will ban "offense language" and begin monitoring private accounts (Office, Skype, and other Microsoft products)? Looking for an alternative to Microsoft Office? I use Apache Open Office https://www.openoffice.org/ Its free and works great!

20- Want a good alternative web browser to Internet Explorer, Microsoft Edge, and Google Chrome?  Try Mozilla Firefox https://www.mozilla.org/en-US/firefox/new/. It can be enhanced with a number of privacy-protecting add-ons, including HTTPS Everywhere and Ghostery, among others (go to the add-ons page after installing Firefox).

21- Delete cookies regularly or disable the use of cookies through your browser. You can “whitelist” cookies from sites you need/trust while still blocking all others. There are also several Firefox add-ons, such as Self-Destructing Cookies, that will do this for you. 

22- Never use the “remember me” function on websites, even from your own laptop or device. 

23- Be mindful of you use of affinity cards, credit/debit/checking cards, and even modern library cards, as they all collect and log data about you and your habits. This information may then be used by the company, shared with its vendors, sold to other companies, or stolen by company employees or outside hackers. It could also be obtained by the government (even without a warrant in many cases). 

Obviously, this list barely scratches the surface of the many countermeasures you can take to keep critical information out of the hands of bad guys and others (corporations, government) who don't need it. My hope is that it will give you plenty of "food for thought" and even many practical ideas for protecting your critical information.
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.     

Wednesday, January 15, 2020

Operational Security (OPSEC) - Part 2: Practical Considerations

By Timothy Gamble (April 3, 2018)

This is part 2 of my Operational Security (OPSEC) article. If you missed part 1, click here to read it

How do the bad guys get our critical information?  The answer is we give it to them, most often without realizing it. For one example of how we might give away our information, take a look at the back-end of the cars in the next parking lot you visit. Chances are that most are covered with bumper stickers, window decals, family stick figures, parking passes, and car magnets that reveal a lot of information to nosy neighbors and potential bad guys.


Take those family stick figures that are so popular today. Folks, justifiably proud of their families, put them on their back windows as representations of their family. But think about what it potentially reveals to bad guys:  number of family members, their sex and approximate ages, even what pets you have. Many of these stick figures often also show the interests of the family: Dad holding a fishing rod, Mom swinging a tennis racket, a young boy holding a baseball bat, an older girl wearing a cheerleader outfit.  And look, the family has two cats, but no dog. The bad guys now have a real good idea of the make up of that family, including many of their interests. 

But it doesn't stop there. That parking sticker reveals where you work. This bumper sticker reveals where you attend church (which, in turn, reveals something about your religious beliefs). Another bumper sticker reveals where your honor student attends school (which, in turn, reveals the general location of where you live). That Bass Masters window decal (along with the stick figure of Dad holding the fishing rod) shows that Dad is really into fishing. And look, there are two car magnets - one a yellow ribbon saying "Support Our Troops" and the other a red, white and blue ribbon saying "God Bless America." Hmmm... This family is patriotic and probably conservative. Bumper stickers and window decals can also reveal political affiliation and ideology, even who we voted for in the last election. Favorite sports teams, causes we support, what groups we belong to, and other interests can also be revealed. Quite a database of private information to put on public display without a second thought.

I'm as guilty of this as anyone. A quick glance at the back of my vehicle reveals a NRA sticker and a GOA sticker, broadcasting to the world that I support the Second Amendment, and am most likely a gun owner and a conservative. The "Freedom From Government" bumper sticker pretty much confirms me as very conservative politically, as does the "Jim DeMint for Senate" sticker. (Wow, that's old. I'm surprised its still readable.) I even have a "Survival Resources" sticker, revealing the fact that I am a survivalist. And the Alumni Association decal reveals my education level, and from what college I graduated. Quite a profile can be built on me by glancing at my vehicle's back end. What do your vehicles say about you?  

Tim, are you really saying we shouldn't have any stickers or decals on our cars? Nope. I'm not saying that at all. What I am saying is that we need to be mindful of what information we are giving away without realizing it. It doesn't matter if the information is being given away on the back of our vehicles, on social media, in our trash, through public conversations, or however. 

I said in part one of this article "The first and most important part of protecting your critical information is to make sure that everyone in your family/group understands what information to protect." If you don't understand what to protect, you're not going to be able to do OPSEC. If you haven't already done this, I highly suggest you sit down with your spouse and/or group members and make a conscious decision about what critical information you want to keep protected. What exactly you consider critical information will depend on your own personal circumstances and concerns, but part one of this article will help you think through this step.

Once you decide what information is critical to protect, then you can examine the back of your vehicle, your use of social media, what paperwork you just toss away without shredding, and other ways you may be giving that information away without realizing it.  Follow this up by taking countermeasures to protect this critical information (part three of this article). 

In closing, I will say that, like most things in life, OPSEC will be about balance. Unless you want to become a hermit on a remote deserted island, it is unrealistic and impossible to perfectly protect every possible scrap of information. The OPSEC process described in part one is designed to help you come up with a realistic plan to protect truly critical information. You have to decide for yourself what information to protect and what steps are reasonable to take given your circumstances. 

As for me, this exercise has made me decide to remove several stickers and decals from my vehicle. I'll keep the NRA and GOA stickers because it is important to me to show my support of the Second Amendment, but the others will be removed today.
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics
. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.    

Tuesday, January 14, 2020

Operational Security (OPSEC) - Part 1: Theory and Overview

By Timothy Gamble (March 31, 2018)

World War II Operational Security poster
The following article is intended as an overview of Operational Security (OPSEC) as it relates to preppers and survivalists. It is a simplified version of the OPSEC training that is provided to the military, national security agencies, government officials, and government contractors. I say simplified for two reasons:
  • I've tried to remove most of the jargon, acronyms, and buzzwords of the military/government training
  • My aim is to protect against  nosy neighbors, local bureaucrats, and everyday criminals, rather than enemy-nations and terrorist organizations.
If you want the flavor of military OPSEC training, I suggest starting with the Operational Security (OPSEC) page of the U.S. Department of Defense Education Activity website.

What is Operational Security?  In two words: Information protection. In more words: Keeping critical information away from those who do not need to know it, or who may seek to use it against you in some way. OPSEC seeks to protect both your privacy and your security. 

The definition begs some questions. What is critical information? Who does, and doesn't. need to know that information? Who may seek to use that information against you, and how? How can you protect that information from those people who shouldn't have it?

OPSEC attempts to answer these questions through a five step process.

1- Identify Critical Information - Answers the questions: What information do we need to protect? What do we want to keep private?What information could be used against us in some way? 

Examples of potentially critical information for preppers and survivalists include financial information, social security numbers, passwords and PINs, medical information, political & religious affiliation, membership in certain organizations (NRA, GOA, OathKeepers, prepper/survivalist groups, tea party groups, etc.), gun ownership, presence of valuable items in the home (guns, gold, silver, cash, tools, electronics, etc.), and purchases of large amounts of food and other supplies. It also may include certain plans (when & where to "bug out", home security measures, personal security measures, etc.). What exactly you consider critical information will depend on your own personal circumstances and concerns.

2- Identify Potential Threats - Answers the question: Who really needs to know this information? Everyone else doesn't need to know this information, and represent a potential threat to abuse or misuse the information, or unwittingly reveal the information to those who might.   


Every neighborhood has at least one Gladys Kravitz.
Examples of potential threats: Identity thieves, criminals, local bureaucrats, school officials, nosy neighbors, and untrustworthy family, friends, co-workers, etc. Even politicians and the government at all levels are potential threats (look at the recent misuse of the IRS and DOJ to go after tea party groups and other political enemies of Obama; doctors being encouraged to ask patients about guns in the home; schools questioning students about their parent's political views, gun ownership, and other private information).

3- Identify Vulnerabilities - Answers the question: How do potential threats get our critical information?  The answer is we give it to them, most often without realizing it. 

Examples of how we give away our critical information:
  • Public conversations can be overheard by anyone nearby.
  • Private conversations can be revealed, accidentally or on-purpose, by anyone involved.
  • Our trash/recyclables can reveal our purchases, financial and medical information, even the supplies we are stockpiling.
  • Nearby neighbors can physically see much of our activities and preparations. 
  • Children, especially young children, tell EVERYTHING to their friends, schoolmates, teachers, neighbors, and other parents (even if you've told them not to).
  • Social media and over-sharing online, even if you are "hiding" behind a screen name or other fake identity (sorry, you are never really hidden online).
  • Smart phones & cell phones  - all calls and texts are logged, and its crazy easy for folks with the technology & know-how to hack or track your phones even when they are in airplane mode or turned off completely.
  • Gmail, hotmail/outlook, yahoo mail, and all other free (and many paid) email services log and archive all email and will cooperate with authorities when asked to provide your information to them. It is also fairly easy to hack into most email accounts.
  • Other technology - affinity cards, credit/debit cards, even modern library cards - log all activity, which is then available to the company (for their use or even resell), government officials with warrants (and sometimes without), and even hackers.
4- Assess the Risks -Answers the questions: What critical information is most important to protect? What threats are the most active? What vulnerabilities are the most likely to reveal critical information?

Not all information is equal. Some critical information is more critical than other critical information - meaning it can more easily or effectively be used against you. Not all threats and vulnerabilities are equal - some are greater than others. Risk assessment involves a subjective analysis of importance of critical information and the likelihood that it can become compromised. Most of the time and effort of OPSEC should be aimed at protecting the most important information against the most realistic threats.

5- Apply Countermeasures - Answers the question: How can the bad guys be stopped from getting our information? This is probably why you came to this article, but you do need to understand all the prior information before you can figure out what countermeasures to take. This is because:

The first and most important part of protecting your critical information is to make sure that everyone in your family/group understands what information to protect. Share this critical information on a "need to know basis" only. Even within your family/group, not everyone needs to know everything. This doesn't mean that you don't trust your family or group members. Rather, the less people that know something, the less chance of it accidentally being revealed. 

If you have children in your family, you need to talk to them about not sharing certain information with non-family members. Teach them to respond to questions, even from teachers and other authority figures, about the family's finances, religion, or politics by responding "I don't know," and "You'll have to ask Mommy or Daddy about that." Young children will need to be reminded of this often. Be careful about what information you share with and around your children (they do have ears).

Additional countermeasures may include:
  • Avoid public conversations or comments about critical information. This includes phone conversations in public. 
  • Shredding/burning of receipts, bills, and documents after they are no longer needed.
  • Be careful of what trash & recyclables you leave at the curb. Even empty boxes may reveal to those nosy neighbors what, and how much. 
  • Cautious use of social media, email, and text messaging. Realize that if you are emitting electronically, your use is being monitored, logged and stored.
  • Wise computer use (no illegal activities; keep your operating system and other programs up-to-date; use firewalls, antivirus, and anti-malware programs; use privacy search engines such as Duck-Duck-Go and StartPage instead of Google, Bing, or Yahoo...). 
  • Always take basic home, office, travel, and personal security precautions.
  • Limit affinity cards. These can be great ways to get special deals, but it comes at the cost of allowing the company to collect information on you. This information may be used by the company, shared with its vendors, sold to other companies, or stolen by company employees or outside hackers. It could also be obtained by the government. 
This list only scratches the surface of the OPSEC countermeasures you can take.  I will expand on this list in several future articles. 
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.    

Tips For Planting Fruit Trres & Common Mistakes

By Timothy Gamble (April 19, 2018)

"The best time to plant a tree is 10 years ago. The next best time is now." -- Japanese Proverb*

I spent part of yesterday planting pear trees on my property. I've planted other fruit trees in the past, with and without success. The following are my tips for planting fruit trees, along with what I consider the mst common mistakes people make.  

Tips for Planting Fruit Trees
  • Dig a hole large enough to hold the entire root ball without the  roots touching the sides of the hole.  Common Mistake: If the roots touch the sides of the hole and bend or wrap around the edge of the hole, then the hole is not big enough. Digging in red clay or rocky soil is difficult and exhausting, and the temptation is to say "good enough" and plant the tree with some of the roots bending at the sides. This is probably the most common mistake many people make when planting trees. 
  • Plant the fruit tree to the proper depth. Plant the tree so that all the roots are covered with dirt without having to mound up the dirt around the tree, but do not cover the spot of the graft union with dirt or mulch. The graft union should be about two inches above the dirt and mulch. Common Mistake: Burying the graft union for dwarf and semi-dwarf trees is another mistake people often make. If the graft union is below soil/mulch level, the scion (the tree grafted onto the root stock) will put out roots and the tree will become a standard size tree. 
  • Loosen the soil for a couple of inches at the bottom of the hole. Compacted soil at the bottom of the hole will be difficult for the roots to grow into.
  • Place the fruit tree in the hole, making sure the roots are not bending or wrapping around. Fill in the hole with good quality top soil, packing it gently with your hands or feet.
  • Staking fruit trees is not absolutely necessary, but is a good idea in most cases to ensure that the tree grows straight. This is especially true in windy areas. 
  • Establish a "weed-free zone" at least three feet in diameter around the young fruit tree. Weeds compete with the fruit trees for water and soil nutrients. Mulching can help control grass and other weeds, but be sure not to cover the graft union with soil or mulch.
  • Most fruit trees  tolerate shade well, but will grow quicker in full sunlight. 
  • Most fruit trees need another tree of the same species, but different variety, to cross-pollinate with in order to produce effectively. Even self-pollinating trees will be more productive with a partner tree.  Common Mistake: Planting only a single tree, or multiple trees of the same variety, will likely result in smaller, or no, yields. (For the record, I planted three pear trees, one each of three varieties - Moonglow, Bartlett, and Ayers.)
  • Most fruit trees should be planted in spring, after the danger of freeze/frost has ended.
  • Give the fruit trees plenty of space to grow by not planting them too close together or to already established trees - 12 to 15 feet apart in most cases.  
  • Thoroughly water newly planted fruit trees, and keep them well-watered for the first few months until they get established. Common Mistake: Letting the soil dry out around a young fruit tree before it gets well-established (takes at least a few months) is a major cause of death of young trees. It is easy to remember watering the first time or two, but it is also easy to forget to keep watering them weeks later.
*The exact origins of this  quote are unknown. It has been attributed as a Chinese proverb, a saying of Confucius, a Japanese proverb, and a Native American proverb, among others. The best time is also given as 20 years, or even 30 years, ago in many quotes. I have a Japanese friend who assures me it is a Japanese proverb, the English translation is I have given above. Regardless, I like the quote and believe it is a timeless truth.  
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.    

Why You Should Include a Cotton Pillowcase In Your Bug-Out Bag

By Timothy Gamble (April 17, 2018)

Here's a piece of gear for your bug-out bag that I rarely hear recommended: a cotton pillowcase. Why a cotton pillowcase? Lightweight and not taking up much space, a cotton pillowcase has a myriad of potential uses in a survival situation.

1- Makes an instant bag for collecting wild edibles, kindling for your fire, or anything else you for which you need a good size bag.

2- Can be used to pre-filter water to remove bugs, leaves, stems, algae, and other rubbish before boiling or otherwise treating it.

3- Can be cut into large (or small) bandages, or fashioned into a sling, for first aid.

4- Can be cut into patches to repair clothing (a small sewing kit is a good idea for a bug-out bag).

5- Can be cut into pieces to use as reusable toilet paper (just boil to clean/disinfect before reusing). 

6- Can be fashioned into a reusable diaper (just boil to clean/disinfect before reusing). 

7- Cotton burns, so it can be used in fire making (it also makes for excellent char cloth).   

8- Can be pressed into use as a dust- or smoke-mask.
--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.   
 

Monday, January 13, 2020

Prepper's Guide to Geopolitics (and Why Its Important to Understand)

By Timothy Gamble 

I've written on this subject before, but those articles get very little attention. That is unfortunate because understanding geopolitics is an important aspect to situational awareness. After all, situational awareness isn't just about your physical surroundings at the moment, but also about the larger context in which you and your family live out your lives. This context includes your immediate physical surroundings, of course, but also the social, political, economic, and geopolitical factors which can, and often do,  have an impact on your life.

I know what some of you are thinking because I've heard from you in the past: I live on my own plot of land in the middle of nowhere. What happens in Iran, or Russia, or China, or the Korean peninsula doesn't affect me. Let the world go to hell in a handbasket. Me and my family will be safe here, isolated from the rest of the world's craziness. 

But that attitude isn't reality. What goes on around the globe could, and often does, affect us in some ways. China destroying millions of hogs due to African swine flu leads to increased hog sales to China (good for US hog farmers), but lowers US hog supplies leading to higher pork prices at the supermarket in the US. It also is causing a shortage of the drug thinner heparin,derived from swine intestines, in the US (how's that for an unexpected consequence).

And that is just one example.  We all know that problems in the Middle East can lead to higher oil prices, raising the cost of gasoline at the pump. And there is always a danger of events spiraling out-of-control (accidentally or on purpose), leading to larger conflicts with even greater consequences. Preppers and survivalists need to understand geopolitics so we can understand the potential impacts and dangers we face.  

How can we understand geopolitics?

We can understand geopolitics by using mental models. In my article Prepper's Guide to Situational Awareness and the OODA Loop I mentioned the concept of "mental models." Mental models are the way we understand the world; the system by which we think. Mental models are important in any decision making process because they are what we base our judgment on - the better the mental models we use, the better our decision making will be. 

Military strategist John Boyd explains the importance of mental models by teaching that in any conflict it is not the one with the most information that wins, but rather it is the one with the best understanding of the information they have that wins.

Geopolitical Model: Chaostan

Chaostan is the geopolitical theory (mental model) by historian and economist Richard J. Maybury which postulates that a large portion of the world is "the land of Chaos."  This land is made up of regions and countries with a long history of political & economic instability, little personal or economic freedom, and no experience with common (natural) law or private property rights. These areas are often tribal, with people more loyal to ancient ethnic lines and religious sects than to their modern nation-states.

According to Maybury, Chaostan consists of about 91 nations, including most of the nations of the former Soviet Union, Eastern Europe, Asia, the Middle East and North Africa. Maps and a full list of the nations considered by Maybury to make up Chaostan can be found on the Chaostan website.

Chaostan covers about one-third of the world’s land surface. It contains a disproportionate amount of the world’s natural resources, including at least 80% of the world’s oil supply and 50 % of the world’s coal supplies. It also has huge amounts of natural gas, gold, silver, platinum, copper, tin, iron, zinc, timber and grain. These are the basic raw materials upon which industrialized civilization rests, giving Chaostan an inordinate amount of influence over Western economies.

It would be thought that a part of the world with such abundance of natural resources would be very wealthy. This is not the case. Although the ruling classes in these regions often have immense wealth, the common folks tend to be among the poorest in the world. In part, this is due to a lack of education, but mostly it has to do with the lack of concepts such as economic liberty and personal property rights.

Chaostan has a disproportionate amount of the world's labor force. A greater labor supply means that labor costs are lower (a simple equation of supply and demand). Also, environmental, health, and safety regulations - a major cost to businesses in the West - are extremely lax in Chaostan. These factors combine to make goods much less costly to manufacture in Chaostan than in the West. 

In contrast to Chaostan, Maybury lists what he considers the “Lands of Liberty.” These are nations where a tradition of liberty has been established – the USA, Canada, Australia, New Zealand, Japan, Hong Kong, the UK, Ireland and most of Western Europe, according to Maybury. In these areas, economic liberty and personal property rights are well-established (although not absolute) and the citizens are typically more loyal to their nation-states than to tribal, ethnic or religious groups. Peace and prosperity (at least domestically), rather than chaos, are the hallmarks of these countries.

Some areas, such as Central & South America and much of southern Africa, exist somewhere between Chaostan and the Lands of Liberty. Only time will tell what direction these regions take, in Maybury's opinion.

It is also worth noting that the Lands of Liberty share a common heritage of Judeo-Christian values and worldview, whereas Chaostan is dominated by Islam (a perversion of the Abrahamic faiths) and other pagan religions.

How can the Chaostan model help in understanding world events? 

There is a vast difference between the worldviews & value systems of the Lands of Liberty and Chaostan that often make it difficult for the two civilizations to understand and interact with each other. Likewise, the disparity of wealth between the Lands of Liberty and Chaostan cause a certain amount of misunderstanding and mistrust between the two. The people of Chaostan often have negative feelings towards the West, including jealousy and anger. The people of the Lands of Liberty often look down on those of Chaostan as being backwards and even dangerous.

It is a mistake for the West to act like or pretend that these differences don't exist, or worse, that the two civilizations are morally equal. They are not. Western civilization (the Lands of Liberty), though not perfect, is demonstrably the superior civilization. The domestic peace and economic success of the West, along with its far superior record regarding basic human rights, relative to the lack of those rights in Chaostan, is proof of the better system. 

The West does have the superior civilization, but does not have the right to impose its system on Chaostan through force. Nation building will never work in Chaostan because its people lack the necessary foundations for modern peaceful and stable nation-states. Simply put, they don't think the same way we do. Therefore, it is foolish to think we can forcibly squeeze them into a Western mold.
  
However, the West has the right and duty to protect itself from the very real threats posed by Chaostan. This includes controlling immigration (even "refugees") from Chaostan, and  insisting that immigrants, students, and temporary workers from Choastan adapt to the Western system while in the West. This should mean zero-tolerance for Sharia law and other forms of religious and cultural "accommodation" that are contrary to the Western system. This may also mean stopping countries like North Korea and Iran from developing nuclear programs because they lack the needed foundations to be responsible and peaceful nation-states. They will use their nuclear programs in an aggressive fashion because they know no other way.   

With such a large difference in worldviews, beliefs, values, and experiences, shouldn't the Lands of Liberty simply stop dealing with Chaostan? Nice idea, but it wouldn't work. The industrialized nations of the West need access to the immense natural resources of Chaostan. Chaostan needs customers for those resources. Chaostan also needs access to Western technology, medicine, and education. Like it or not, we need each other. 

Besides, the genie is already out of the lamp, so to speak, as the Lands of Liberty have foolishly allowed  many millions of immigrants and refugees from Chaostan into our countries without insisting on full assimilation into our culture. This is presenting a large number of problems for Western civilization.

There is a war of civilizations going on between the two sides. Virtually every hot spot and potential flashpoint in the world is explained by this model. The war, violence and poverty in Chaostan is mostly due to the lack of personal & economic liberty, including the lack of private property rights, as well as tribal & sectarian divisions. The inability & unwillingness of Chaostan immigrants and refuges to assimilate into Western culture is likewise explained by the Chaostan model.

As preppers and survivalists, we must understand that these divisions and conflicts will continue and even grow worse as civilizations intermingle. We must be prepared for a world that will only grow more dangerous over time.  We will never solve these problems. Only God's intervention can solve these problems. That is why the Bible says there will be no peace until the return of Christ, and why foolish dreams of uptopia can never be achieved. We must accept and deal with the world as it is, unpleasant as that may be at times.

Ultimate Reason Preppers & Survivlaists Should Care

Chaostan, with its war, violence and poverty, stands as a warning to the Lands of Liberty should we ever reject the concepts of personal and economic liberty, and our common Judeo-Christian heritage. Chaostan is our future should we continue down the path of collectivism, rejecting free markets and private property rights in favor of socialism, and rejecting personal and religious freedom in favor of imposing political correctness.

The Lands of Liberty can be  (will be?) overcome by Chaostan and lose our freedoms should we continue this destructive path. As I type this paragraph, fools are moving to take away our Second Amendment rights, the right to defend ourselves and our families. The giant social media companies are doing what they can to restrict our rights to Free Speech and Freedom of Religion. Congress again passed another massive budget which left the border wall largely unfunded. And we continue to allow our schools and universities teach our children that Western civilization and traditional values are bad. Things don't bode well for our future.

****I want to give Richard J. Maybury full credit for his concept of Chaostan and the Lands of Liberty. The middle section of this article is my summary of Mr. Maybury's geopolitical theory, as best as I understand it. For more details, visit his website.

Mr. Maybury is also the author of a great set of educational books on economics, law, history, and personal finance called the "Uncle Eric Books." I strongly recommend these easy-to-read, highly informative books. Here are two of my favorites:


Whatever Happened to Penny Candy?  A fast, clear, and fun explanation of the economics you need for success in your career, business, and investments

Whatever Happened to Justice?  Explains what's gone wrong with America's legal system and economy, and how to fix it.

--------------

Please subscribe to Dystopian Survival using the Follow By Email field at the bottom of the right hand column. 

On Social Media: 

Twitter: @DystopianSurv - My account specifically for this website. 99% prepping, survivalist, and homesteading tweets. Few, if any, posts on politics. 

Twitter: @TimGamble - My main account. Survivalist information, plus heavy on news, politics and economics. 

GAB: @TimGamble - Mainly a back-up account for when Twitter bans me for being not being a leftist.