Thursday, August 31, 2017

Individual OPSEC and Personal Security



Here is a link > https://goo.gl/AdMELG < to download the paper (PDF File) "Individual OPSEC and Personal Security". The paper is in English, and focused on the United States, but also contains a lot of resources and information that will be useful, no matter where in the world you may live.

What Is OPSEC (Operations Security)?

Operations Security, or OPSEC, is the process by which we protect unclassified information that can be used against us. OPSEC challenges us to look at ourselves through the eyes of an adversary (individuals, groups, countries, organizations). Essentially, anyone who can harm people, resources, or mission is an adversary.

OPSEC should be used to protect information, and thereby deny the adversary the ability to act. Nearly 90% of the information collected comes from "Open Sources". Any information that can be obtained freely, without breaking the law, is Open Source. It is social network sites, tweets, text messages, blogs, videos, photos, GPS mapping, newsletters, magazine or newspaper articles, your college thesis, or anything else that is publicly available.

Our OPSEC objective is to ensure a safe and secure environment. OPSEC is best employed daily when making choices about what communications to use, what is written in emails or said on the phone, postings on social networking sites and blogs. Any information you put in the public domain is also available to your adversaries.
The bottom line is that we can be our own worst enemy.

What is Personal Security?

Personal security is a general condition that results after adequate steps are taken to (a) deter, (b) delay, and (c) provide warning before possible crime, (d) if such warnings occur, to summon assistance, and (e) prepare for the possibility of crime in a constructive manner.  Reasonable efforts to execute these five tasks can greatly reduce security risks, sometimes to negligible levels.  
Security efforts will of course differ, based on the circumstances of each individual.  Work or school responsibilities, area of residence, family activities, and other factors influence security needs.  Some people may need to upgrade the security of homes; others of their children; yet others of their travel, computing, and so forth. Each person should consider selectively implementing the options most pertinent to their own needs.


If you want to make your life a little bit more secure, take a look at "Individual OPSEC and Personal Security (September 2017)" -  https://goo.gl/AdMELG 


Sunday, August 27, 2017

Security in a Box



SECURITY IN A BOX
ИНСТРУМЕНТЫ И РЕКОМЕНДАЦИИ ПО ЦИФРОВОЙ БЕЗОПАСНОСТИ


https://securityinabox.org/ru/

"Безопасность-в-коробке" - руководство по цифровой безопасности для правозащитников и (в более широком смысле) гражданских активистов по всему миру.

Если вы новичок в теме цифровой безопасности, вам могут понравиться наши Рекомендации. Они касаются базовых понятий, включая, например, советы по более безопасному использованию социальных сетей и мобильных устройств. Раздел Инструменты содержит пошаговые инструкции о том, как устанавливать и использовать полезные программы и сервисы.



Wednesday, August 23, 2017

Understanding Threat




There is no single solution for keeping yourself safe in cyberspace or in the physical world. Individual OPSEC and Personal Security isn’t about which tools you use; rather, it’s about understanding the threats you face and how you can counter those threats. To become more secure, you must determine what you need to protect, and from whom you need to protect it. Threats can change depending on where you’re located, what you’re doing, and with whom you’re working. Therefore, in order to determine what solutions will be best for you, you should conduct a threat assessment of your personal life.

When conducting this threat assessment, there are five main questions that you should ask yourself:

1. What do you want to protect?
2. Who do you want to protect it from?
3. How likely is it that you will need to protect it?
4. How bad are the consequences if you fail?
5. How much trouble are you willing to go through in order to try to prevent those consequences? (Electronic Frontier Foundation, 2015)

By increasing the effort required to target you it is often possible to cause an adversary to choose a different target. Cyber-criminals, corporate spies, foreign agents, and even government investigators frequently target the ‘low-hanging-fruit’, they go after the easiest, most cost-effective targets. Even if you are the specific target an adversary is after; it is important to remember that not all adversaries have unlimited resources, nor do they have unlimited capabilities. It is quite possible to employ security that requires greater resources to defeat than an adversary has readily available.

It is also important to employ security in depth.  An adversary may be able to defeat a single security measure.  No security is perfect.  By increasing layers of security, building depth into your security plan, the weaknesses and exploitable vulnerabilities in one security measure may be covered by the strengths of another.

Finally, remember that no security measure is of any value if it is not used. If security becomes too difficult, it will not be used regularly. The human factor is often the greatest weakness in any security program. When looking at the various security applications that we discuss here, choose the ones that you can and will employ on a regular basis. Good security employed consistently is better than great security employed occasionally.



Wednesday, August 16, 2017

Mossberg 590 Shockwave


The Mossberg 590 Shockwave is a 12 gauge, six shot (3" shells), 14" barreled firearm "shotgun" (26.5" overall). It is classified by the American BATF (Bureau of Alcohol, Tobacco, Firearms) as a "Non-NFA Firearm" meaning that the firearm requires no tax stamps for transfers. You can purchase it as you would any other shotgun.

It’s hard to beat a short-barreled shotgun in close quarters, and thanks to the fore-end hand-strap and the angle of the Shockwave Raptor birdshead grip, recoil is much easier to manage than one might expect.





Sunday, August 13, 2017

UNODC e-Learning (Cryptocurrency Course)



Управление ООН по наркотикам и преступности является мировым лидером в борьбе с незаконным оборотом наркотиков, преступностью - во всех её формах - и терроризмом.

Образовательная платформа предлагает разнообразные курсы и модули, которые предоставляют обучение в современной, безопасной и экономически эффективной форме.


Take a free, on-line, course and learn about Cryptocurrency.





Thursday, August 3, 2017

Treat Wounds With Cayenne Pepper



Cayenne pepper can stop bleeding in less than one minute under most circumstances. Cayenne can be sprinkled directly onto the wound with no modification to the cayenne whatsoever. It can also be dissolved in a bit of water and used to saturate a piece of gauze that is placed over the wound area. Cayenne pepper equalizes the blood pressure and allows cuts, even deep cuts, to clot quickly. Not only does it stanch the blood flow of a cut or laceration, but it also actually disinfects the wound as it possesses anti-fungal and anti-bacterial capabilities.