: : S E C U R I T Y : : |
|
|
The crux of the Organized Surveillance campaigns is to maintain an undetectable state. This means that breaking and entering is a no-go, unless they can remove the "breaking" aspect, and then it's a "go!" So, the key point I will stress here is that you should setup your security in a fashion that will show physical evidence if any tampering has occurred. If there's physical evidence, then there's a crime and where there's a crime there becomes a record and a record is a cardinal sin for these offenders. For them, it's all about going undetected. With that said, some of the things I'll present are quite simple and low-tech --- actually ancient in some respects.
First, I'm going to present some conventional security information, much of which is fairly obvious. More of the same is not necessarily better. Diversify. Two locks on a door, all of the same style, may be defeated by a similar attack. Two different styles of lock requires two different modes of attack. Some non-branded, Chinese made security products could plausibly provide better security than a big-name, common product by way of being novel and obscure and therein presenting more hoops for a offender to hop through when trying to find schematics, code keys or additional information that might allow them to circumvent the security device. This would represent a beneficial instance of something being 'lost in translation.' The more diverse your security arrangement is, the less likely it is to be wholly defeated. Even if the offender is so adept that they can detect and defeat everything you throw at them, you may rest assured that you will have at least slowed them down and maybe even prevented them from carrying out their full objective. The most advanced security technology can't replace having feet on the ground --- human or canine.
I believe that there are four primary reasons for the surreptitious agent entries into a target's home:
As a Targeted Individual, your security options are limited, though this should not preclude you from taking other recommended security measures because all of us are still susceptible to the common burglary. The following items may be more applicable to those who are targeted.
The following material is more conventional in aspect and doesn't particularly benefit Targeted Individuals. [ Perimeter ] If you live in a populated neighborhood, the offender may attempt entry at the least conspicuous location which could simply be the front door or the garage. One technique that can be used by the offender is to have a large vehicle, such as a trailer or van, parked in front of your property in order to obscure your neighbors line-of-sight. Look around your property and determine which areas you would choose to enter if you were a burglar. After determining these locations, emplace some obstacles. If you live in a rural location you will need more strategic deterrents. Rural locations are actually more vulnerable because once you are away from the property, the criminals can move into action and spend as much time as is necessary to attack your property without the fear of being spotted. [ Doors ] Door hinges should not be exposed to the exterior. Doors should be windowless. The strongest door and lock in the world is only as secure as the frame and jam that envelop it. I recommend the use of both a high-end keyed lock and a high-end padlock for your doors exterior along with a interior-side-only-keyed-deadbolt. Knowledge on how to defeat these high-end locks eventually evolves, so the same models that are esteemed at the time of this writing may be irrelevant tomorrow. Regardless, their costs will start at several hundred dollars apiece. These will be the best physical deterrent that I can recommend. [ Home Alarm System ] These will be defeated, but I will mention them on the premise of detecting conventional burglars. Wireless systems may seem hi-tech and cool, but they can be defeated via frequency jammers. Hard-wired units with a back-up uninterrupted power supply is preferable. When using keypads or combinations use confusing dummy sequences while only truly depressing the actual combination code keys. Heat signatures can be read on the touched keys with IR, and the unique frequencies of the individual keys can be sniffed-out with remote RF scanners. ArgenMesh shielding could be explored in these situations. Infrared and wireless sensors can be jammed. Laser, acoustic, compression or fiber-optic sensors may be a better alternative. [ Windows ] Keep blinds drawn when away from home. Install a screw or stick into window jams to prevent the window from being slid open, even if the glass is broken. Use security film, laminated or reinforced glass. Hard-wired sensors are preferable to that of wireless. Be prepared for a plan of action in the event of a fire. [ Lighting ] Motion lighting may be beneficial, but note that infrared sensors can be jammed. Hard-wired lighting, out of reach, is recommended in obscured areas of the home's perimeter. Timed indoor lighting systems may fool a common criminal, but for the targeted individual it is pointless because they always know whether you're home. [ Cameras ] Hard-wired cameras should be placed at exterior corner locations to allow for video capture of all angles. (The wires of the cameras should be protected with flexible conduit or pipe which can be found at a home improvement store.) They should capture areas of main entryways as well as obscured locations that neighbors can't see. Infrared LED beam cameras reduce the need for additional exterior night-lighting (LED cameras cannot be used from behind a window or protective covering, due to reflection glare). Wireless cameras are susceptible to signal jammers. Connect cameras to a DVR or hard-wired computer that can either store the footage or relay the footage over the internet or to a smart phone. Utilize dummy cameras along with real cameras. Use concealed or hidden cameras. Utilize a wild game, hunter or nanny motion camera. Insure that the recording equipment is concealed or placed within a locked space that would show evidence if tampered with. [ Booby Traps ] Illegal. Yes, they are illegal. Of course, if you insist on breaking the law you may have to let a jury decide whether the real criminal is yourself, or the burglar pig who lost his eyes from an attenuated 12 gauge bird-shot trip-wire. Oh yeah, it's still illegal! Yes, it's still illegal even though you posted a sign on the front door that said "Beware of Booby-Traps." [ Automobile ]
Car alarms may only be a small annoyance to someone with skills. One of those strobe light & siren combo units that locks onto a steering wheel may be more effective due to its novelty. Use your manual key instead of remote key when possible to lower the risk of an offender cloning your remote signal key. Unless you know and trust an automotive professional who will help you out, you should not even waste your time searching for GPS tracking units installed on your car. They are really small now and their signals may be pulsed and difficult to detect or static until movement is detected. Some GPS units stay in sleep-mode until they are "called" by the offender to wake up and transmit coordinates. There are some reasonably priced dash or mirror cameras available on amazon.com that may be useful in cataloging incidents involving offenders out on the street. Watch for tampering with your tires or wheel bolts. Watch for dripping fluid from under the vehicle. If I worked for DARPA or one of the intelligence agencies, I would have already created a small transmitter, smaller than a cellphone, which could emit radio signals that could elicit effects such as nausea, headache or drowsiness. The Lida machine did this decades ago (although, with pleasing effects), so you can imagine what current technology can do! This device could be concealed near any place that a target would sit, and it could be remotely activated via phone, etc. With all its possible implementations, do you think this capability doesn't already exist ? [ Information Technology ] Computers: Protecting your information and activity on a computer is an increasingly difficult endeavor, but regardless, you should still attempt to harden your systems security. Use an Ethernet land-line when possible and keep it disconnected as much as possible (air gapping). Use open-source software applications. Verify your software with checksums or hashes. The only people who really know if a proprietary application has a back door are the Feds and the application's authors. Use keyboard and hard-drive encryption software. Use a robust and ubiquitous anti-virus program. Use a robust Firewall! Use a virtual sandbox application! Utilize virtual operating systems when performing risky or private tasks (e.g,TAILS). Use proxy chaining or at least just a simple proxy. Use encryption software (TrueCrypt). Use encrypted email services. Spoof MAC addresses. Use privacy browsers (Tor)! Use encrypted SMS/MMS texting. Periodically, review system security event logs. Download material on a separate computer and scan and transfer to your own. Applications that are relevant today may be dinosaurs tomorrow, so research the right application for your needs. Never do anything nefarious while utilizing privacy concealing techniques because it will only bring into question all of the instances of legitimate usage! Phones: When urgent privacy is needed, remove your phone's battery. Place a small piece of electrical tape over front facing cameras. Jailbreak or Rooted phones may afford better security for those who know what they're doing. Install a good anti-virus and Firewall program which only allows exiting data from applications that you trust. Use an encrypted texting application. You can find many of the same privacy applications for your phone as are listed for the computer, above. Be aware that your device (computer or phone) can be tapped into remotely by RF sniffers. The keys you press and the images on your screen all emit unique frequencies that can be scanned remotely and reconfigured into a character or image on the offenders system. This is not conspiracy; this is the simple science behind real technology available to intelligence personnel. Using something like ArgenMesh may attenuate the signals your device emits when it is draped over your device. [ The Self ]
Be prepared to protect yourself should you ever encounter a threat to your self well-being. The best defense is to talk yourself out of a situation, such as I have successfully done for the past 25 years. Self defense courses could be beneficial in showing one how to exploit body "pressure points" by the use of strikes and holds. Weapons can be grouped into three basic category types through cutting force, blunt force and projectile force (blades, clubs & guns). All three of these categories can comprise lethal and non-lethal effects. I would recommend that everyone have at least one non-lethal and one lethal tool at their disposal. I would recommend the following items to meet the needs of every category:
I would recommend a good gun safe bolted to the wall and floor along with added weights in the bottom and placed in a tight space that is preferably behind a false wall or a hidden room. A tip that I'll leave you with is that if you are ever traveling or need a place to secure your firearm away from home, find and use a pawn shop! Yes, use a pawn shop to temporarily and securely hold your firearm. Just make sure that you are "pawning" it, and not selling it, before you sign your name ! Don't waste money on electric stun guns (either blunt or projectile) because they rely on power sources and they require close proximity. If you have a steering wheel lock in your car, it can double as a blunt-force club. Lastly, there is one weapon you can carry with you everywhere --- your belt and buckle. A heavy, solid buckle clasp or a loop buckle that could accept something hooked or clasped onto it (for example, a heavy key chain or ring of keys) can be swung with force. Just be aware that if you miss your target, the buckle end is swinging back in your direction! The last thing I want to convey here is that while taking security measures can be beneficial, no amount of precautionary measures are totally foolproof. So, shed all false senses of security and be prepared to cope if your privacy and property are violated. |
- Tag Cloud -
101
,
ATF
,
Activist
,
Aerial vehicles
,
Autism
,
Alzheimer
,
ADHD
,
Allan Frey
,
acoustics
,
anarchist
,
aluminum foil
,
Americans
,
America
,
adrenaline
,
aneurism
,
anxiety
,
Anechoic Chamber
,
Anechoic Tile
,
Army Reserve
,
Artificial Telepathy
,
Aaron Alexis
,
Artificial Intelligence
,
argenmesh
,
audio surveillance
,
assasination
,
silent assasination
,
barcodes
,
big brother
,
biometric surveillance
,
biometrics
,
blackmail
,
biotelemetry
,
bioelectromagnetics
,
booby trap
,
Blacklisted
,
Brain Mapping
,
brainwashing
,
brainwash
,
brain wash
,
brainwaves
,
brainwave monitoring
,
brainwave scanning
,
bunker
,
carbon
,
carbon fiber
,
carbon nanotube
,
Carnivore
,
cataract
,
Cause Stalking
,
ceramic
,
CIA
,
CSS
,
civil rights violations
,
constitution
,
constitutionalist
,
copper
,
Civil Disobedience
,
Conservative Christian
,
Christian Right
,
Christian Crimes
,
Christian Atrocities
,
chemtrails
,
conductor
,
COINTELPRO
,
Community Based Harassment
,
Citizen Corps
,
chest pain
,
Community Watch
,
Community Oriented Policing
,
computer hacking
,
computer monitoring equipment
,
computer surveillance
,
covert abuse
,
Covert Harassment
,
campaign
,
countertruth
,
curling and cramping
,
counter truth
,
covert manipulation
,
covert surveillance
,
Covert technology
,
Covert Murder,
,
Covert War
,
Crook or Stiff Neck
,
Deep Web
,
DHS
,
Department of Homeland Security
,
dissident
,
DeepWeb
,
Deep Net
,
DeepNet
,
DarkNet
,
Dark Net
,
DarkWeb
,
Dark Web
,
Democracy
,
DARPA
,
DEW
,
Diary of a Targeted Individual
,
dielectric
,
DIA
,
diabetes
,
Directed Energy Weapon
,
DEWs
,
disinformation
,
DNA tracking
,
DOD
,
DOD Directive 5240.1
,
DOD Regulation 5240.1.R
,
DOJ
,
dr. robert duncan
,
domestic spying
.
domestic surveillance
,
domestic terrorism
,
domestic terrorist
,
drones
,
dumbing down
,
EEG
,
EEG cloning
,
electroencephalogram
,
executive order
,
EDOM
,
EEG heterodyning
,
extremely low frequency
,
ELF
,
Echelon
,
eugenics
,
Edward Snowden
,
electronic harassment
,
electromagnetic technology
,
electromagnetic weapons
,
Electromagnetism
,
Electromagnetic Shielding
,
EMF
,
EMI
,
EMR
,
EMP
,
electromagnetic pulse
,
Electronic Assault
,
eye floaters
,
electronic harassment
,
electronic stalking
,
electronic surveillance
,
electronic torture
,
electronic surveillance laws
,
electronic weapons torture
,
Executive Branch
,
extremely low frequencies
,
facial recognition technology
,
fascism
,
FBI
,
FCC
,
FOIA
,
False Flag Operation
,
freedom fighter
,
Faraday Cage
,
Foreign Power
,
fatigue
,
Fort Meade
,
Ft. Meade
,
food tampering
,
Frey effect
,
Fusion Centers
,
gang stalking
,
George Orwell
,
Geral Sosbee
,
Global Agenda
,
Global Initiative
,
globalization
,
Government Intelligence
,
gaslighting
,
GWEN
,
HAARP
,
Handlers
,
hair raising
,
Headache
,
Head pressure
,
High-pitch tone
,
hearing drop
,
heterodyning
,
HPM
,
high power microwave
,
hearing voices technology
,
hidden camera
,
heart attack
,
heart valve damage
,
home surveillance
,
human experiment
,
human experimentation
,
human guinea pig
,
human rights violations
,
Illuminati
,
satellite imaging
,
implants
,
ionosphere
,
infrasound
,
Infragard
,
insulator
,
infrasound weapon
,
ionizing radiation
,
interferometry
,
Iris biometric tracking
,
John Fleming
,
John Hall
,
Jesse Ventura
,
Joint Intelligence Centers
,
Joint Operations Center
,
Joint Regional Intelligence Center
,
Joint Targeting Efforts
,
JRIC
,
kidney disease
,
kidney failure
,
leukemia
,
Luddite
,
Lupus
,
Law Enforcement
,
Law of the USA
,
laws of the US
,
laws of USA
,
lead shield
,
magnetic ressonance
,
masers
,
mass murder
,
Mass Population Control
,
mass technological manipulation
,
MEDUSA
,
Microchip
,
microchip implant
,
microwave communication towers
,
microwave weapon
,
microwave harassment
,
microwave interferometry
,
metamaterial
,
misinformation
,
militant
,
Military Intelligence
,
Military Mind Control
,
Military propaganda
,
military psy ops
,
mind control
,
Multiple Sclerosis
,
Muscle jerks and twitching
,
myoclonus
,
Muscle stasis
,
Mind Control Handlers
,
mind control patents
,
militia
,
mind control technology
,
mind reading technology
,
mumetal
,
mu metal
,
mylar
,
memory loss
,
millimeter wave
,
Myron May
,
Natural Law
,
Nazi
,
Nazi mind control
,
neural mapping
,
NGO
,
neural telemetry
,
neuralizer
,
neodynium
,
NWO
,
new world order
,
nausea
,
nerve
,
nerve tingling
,
nerve damage
,
Neurophone
,
nanotube
,
Nikola Tesla’s inventions
,
non-lethal weapons
,
nonlethal weapons
,
non lethal weapons
,
NSA
,
NWO
,
OSHA
,
Organized gang stalking
,
Organized stalking
,
Organized Stalking Electronic Harassment
,
Organized Vigilante Stalking
,
Organized Surveillance
,
OS/EH
,
particle beams
,
plasma
,
Patric Flanagan
,
POTUS
,
patriots
,
Patriot Act
,
pain amplification
,
pc surveillance
,
personal computer hacking
,
pc monitoring
,
Posse Comitatus
,
police abuse
,
police brutality
,
police cops
,
Parkinson's Disease
,
panic attack
,
police misconduct
,
pb
,
pins and needles
,
portable microwave energy weapon
,
Predator Drones
,
Project MK ULTRA
,
poisoining
,
poison
,
Propaganda
,
phasor
,
priapism
,
pancreatitis
,
induced priapism
,
ED
,
Psy Ops
,
psyops
,
Psychiatry
,
psychotronic
,
psychotronics
,
quantum physics
,
radar laser beam
,
radar gun
,
radiating weaponry
,
radiation
,
RFID
,
Radical Right
,
radio waves
,
radio frequency mind control
,
real time surveillance
,
Remote Brain Targeting
,
Remote Control of Human Nervous System
,
Remote Control of Humans
,
racing heart
,
remote heart attack
,
Remote Sensing
,
remote interrogations
,
remote brain wave monitoring
,
runaway adrenaline attack
,
Remote Monitoring
,
RFID chip
,
rubber
,
SCOTUS
,
SATAN
,
Satellite Guided GPS
,
semiconductor
,
scalar wave
,
scalar energy
,
sinus spasm
,
surveillance
,
Sleeping hands or limbs
,
satellite terrorism
,
sexual orientation manipulation
,
Schizophrenia
,
sneeze attack
,
science
,
sex offender
,
Shielding Material
,
shielding
,
street theater
,
street theatre
,
Shocking
,
silver
,
Silent Massacre
,
sneak and peak
,
space preservation act
,
sovereign citizens
,
space based weapons
,
sham rage
,
spastic colon
,
sleep disruption
,
silent sound
,
subliminal
,
sound spotlight
,
stroke
,
survivalism
,
survivalist
,
Spy Drones
,
Spy Satellites
,
Stalking by Proxy
,
Star Wars
,
surreptitious entry
,
subliminal message
,
Surveillance Laws
,
surveillance programs
,
surveillance
,
SIDS
,
synthetic telepathy
,
targeted individuals
,
tasers
,
tactics
,
terrorism
,
terrorist
,
technology
,
thyroid cancer
,
thyroid
,
tennitis
,
Ted Gunderson
,
TEMPEST
,
TIA
,
Tesla
,
TIPS
,
tremors
,
through the wall imaging
,
through-wall imaging
,
Total Information Awareness
,
Tortured in America
,
UAVs
,
US Code Title 50
,
ultrasonic
,
ultrasound
,
ultrasound weapons
,
V2K
,
VDI induction
,
Verichip
,
Voice Recognition
,
Voice of God
,
Voice to Skull
,
War on Terrorism
,
Warfare
,
War Room
,
We the People
,
whistleblower
,
whistleblowers
,
what is harassment
,
Weed and Seed
,
x-ray vision
,
yawning attack
,
Zap
,
Zetas
,
zombie apocalypse
,
zombie
,
101
,
organized stalking help
,
gang stalking help
,
electronic harassment help
,
organized stalking tactics
,
Law Enforcement Intelligence Unit (LEIU)
red burning ear syndrome
HOME
|
Counter-attacking the lies, disinformation and
propaganda to bring you the truth --- the Counter Truth ! © 2015 - 2020 Countertruth.com . All Rights Reserved.
|