Radio Free Redoubt: When Ham Radio Is Banned and Non-Permissive Op Environments Part 2

The following podcast comes from Radio Free Redoubt.

AmRRON POLICY:  AmRRON OPERATIONS ARE LEGAL AND LAWFUL, and when using Amateur Radio bands, FCC rules apply.

We don’t use encryption over radio.  There’s no need to.  There’s no need to use tactical callsigns.  But we do practice with it using the internet and other platforms where it’s perfectly legal.

  • More on authentication
  • Authentication using  PGP key signatures for files
  • Tactical Callsigns (COMSEC/PERSEC/OPSEC); the alternative to using FCC callsigns when protecting your identity is necessary.
  • ‘Modding’ your radio (aka. Open banding, opening up, MARS modding, your radio to operate outside amateur radio bands)

AUTHENTICATION (TWO-WAY)

THE TEN-LETTER WORD AUTHENTICATION

The following is a visual of the one-way authentication example as used in the podcast:

Figure 1

THE DRYAD

The image below (Figure 2) is an example of a ‘Dryad’, found in military CEOIs, and was used for two-way authentication and enciphering numbers.  There is VERY little information available open source (on the internet) discussing or explaining most components of a CEOI.  However, American Partisan has a series of articles for the Raspberry Pi enthusiasts, for generating tactical callsigns, dryads, and more.  Today, authentication and encryption is loaded into modern military radios, and these soldier comms skills are (were) a dying art.  We’re bringing them back.

Figure 2

Instructions on using the dryad will not be covered here, but will be covered in the near future.

The following two links cover NCScout’s postings at AmericanPartisan… an excellent resource for modern patriots, including radio operators.

Note, it is a script for generating dryads, callsigns, etc. on a Raspberry Pi, for those of you savvy with using R-Pi.

R-PI OTP/DRYAD TRUE HARDWARE RNG HOW-TO

NEW STUFF FOR THE R-PI OTP/DRYAD – CEOI ADDITIONS, JEFFERSON THOMAS

Radio Free Redoubt: When Ham Radio Is Banned and Non-Permissive Op Environments

The following podcast comes from Radio Free Redoubt, covering non-permissive radio operations environments and ‘when ham radio is banned’.

The Non-permissive operating environments in segments 2 and 3, beginning at about the 19:00 minute mark.

Radio Free Redoubt Ep. 22-28 When Ham Radio Is Banned and Non-Permissive Op Environments

TACDA: Psychology of Civil Defense Webinar, Sat., Nov. 12

The American Civil Defense Association is holding an online webinar on the topic of Psychology of Civil Defense on Saturday, Nov. 12, 2022 at 5pm Pacific time. The meeting is scheduled to last 45 minutes with 15 minutes for questions.

Psychology of Civil Defense
Fear, panic, and sheer terror overwhelm the masses during and immediately after major disasters.

Our survival is dependent upon a change of attitude and the acknowledgment that we are at risk!

Topics of discussion:
▪ Assessing Your Risk
▪ A Change of Attitude
▪ Neighborhood Emergency Plan (for more information see below links):
▪ Psychological Preparation for Life in a Shelter
▪ Plan of Action in the Event of a Disaster

Neighborhood Emergency Preparedness Plan handout: Click HERE

Re
corded meeting from June 2022 Are We Ready? Neighborhood Emergency Preparedness: click HERE
***
HOPE TO SEE YOU THERE!

Saturday, November 12 2022 | 6:00 pm MST

TACDA is inviting you to a scheduled Zoom meeting.

Topic: Psychology of Civil Defense (Ch. 1, TACDA Academy)
Time: Nov 12, 2022 06:00 PM Mountain Time (US and Canada)

Join Zoom Meeting
https://us06web.zoom.us/j/89634802393?pwd=OHV1VmY2N1FhT0dPV3o4Zkp2VjVjdz09 Meeting ID: 896 3480 2393
Passcode: 855196

One tap m
obile
+17193594580,,89634802393#,,,,855196# US
+12532158782,,89634802393#,,,,
855196# US (Tacoma)

Dial by your location
+1 719 359 4580 US
+1 253 215 8782 US (Tacoma)
+1 346 248 7799 US (Houston)
+1 408 638 0968 US (San Jose)
+1 669 444 9171 US
+1 669 900 6833 US (San Jose)
+1 646 876 9923 US (New York)
+1 646 931 3860 US
+1 689 278 1000 US
+1 301 715 8592 US (Washington DC)
+1 309 205 3325 US
+1 312 626 6799 US (Chicago)
+1 360 209 5623 US
+1 386 347 5053 US
+1 507 473 4847 US
+1 564 217 2000 US

Meeting ID: 896 3480 2393
Passcode: 855196
Find your local number: https://us06web.zoom.us/u/kbBbDkbwQH

AmmoLand: Gun Voters Could Deal A Punishing Blow on Election Day

Dave Workman at Ammoland.com writes about how Gun Voters Could Deal A Punishing Blow Driving Home the Win on Election Day 2022. Despite court victories re-affirming the individual right to keep and bear arms, oppression-minded politicians and organizations continue to press for the denial of people’s rights across the nation. Here in the northwest, Oregon’s Ballot Measure 114 is perhaps the most onerous gun control farce on the ballot.

The critical Nov. 8th 2022 midterm elections are only days away. As people continue talking about a “red wave” sweeping across the U.S. landscape to wash anti-gun Democrats from Congress and state legislatures, the “gun vote” could be the decisive factor in many of these races.

According to Fox News, “The discussion surrounding gun control in the United States is a core issue for some voters heading to the ballot box this November.”

The critical factor is whether gun owners—who often are guilty of lethargy and/or election season apathy—will turn out in adequate numbers to swing the vote. They did last year in Virginia, putting solid pro-gunners in statewide offices, but will they repeat that performance on a national scale?

Take a look at Massachusetts, where the Gun Owner’s Action League just released a report showing how homicides in the Bay State have increased 110 percent since the passage of the 198 Gun Control Act in that state. GOAL Executive Director Jim Wallace, in a telephone conversation with AmmoLand News, said the report speaks for itself:

“The Commonwealth’s decades old gun control scheme has been an unmitigated disaster.”

The law failed to reduce gun-related homicides. It failed to reduce accidental firearms fatalities, and it has done poorly in efforts to reduce gun-related suicides.

Call it the “October non-surprise” since gun control laws have also failed in other regions.

Out in Oregon, Fox News is reporting on Ballot Measure 114, an extremist initiative that would add Oregon to a list of states currently requiring a permit to purchase a firearm. [government permission slips]

According to Fox, “Oregon’s law would be the only one that mandates a live-fire safety class approved by the state police and administered by local law enforcement.”

The proverbial fly in the ointment is that nearly all police agencies do not have the facilities to provide the required training.

The story further notes, “The Oregon State Sheriff’s Association opposes Measure 114, citing the burden it would place on financially-strapped law enforcement agencies. Officials say it would delay law-abiding citizens from being able to purchase guns by months or even longer.”

Kevin Starrett, director of the Oregon Firearms Federation, told Fox News essentially the same thing he told AmmoLand News months ago: “The measure is designed to absolutely guarantee that people will not have the means to protect themselves and to dox anybody who attempts to comply with the permit process.”

In Georgia, it’s gun owners versus an avowed anti-gunner in Stacey Abrams, whom Fox News described as “one of the most significant advocates of gun control in a battleground election against Republican Incumbent Gov. Brian Kemp.”

The Fox report also pointed to Ohio, where anti-gun Democratic State Representative Tim Ryan is squaring off against Republican JD Vance.

It is against this backdrop that Friday’s attack on Paul Pelosi, husband of Democrat House Speaker Nancy Pelosi—another perennial gun control proponent on Capitol Hill—was so shocking. Pelosi was brutally attacked in his own San Francisco home. He was seriously injured by a suspect who wielded a hammer, demonstrating that blaming guns and penalizing gun owners for violent crimes is a false flag.

Reacting to the attack, Alan Gottlieb, chairman of the Citizens Committee for the Right to Keep and Bear Arms, said the nature of the attack “should preclude any effort by Speaker Pelosi’s Democrat colleagues to exploit this horrible incident for the purpose of advancing their extremist gun control agenda.

“This is the kind of violent crime against which average citizens, including Speaker Pelosi’s constituents, must be prepared to defend themselves on a daily basis in an environment where the far left has pushed ‘defund-the-police’ efforts and adopted policies which have allowed dangerous individuals to roam our streets and neighborhoods,” Gottlieb added.

In Gottlieb’s home state of Washington, there is also an energetic challenge of 30-year-incumbent Democrat Sen. Patty Murray—a dependable anti-gunner—by Republican Tiffany Smiley, a political newcomer who has been waging a remarkably effective campaign. A strong turnout of Evergreen State gun owners could provide a nasty surprise to Murray, who critics say has never represented their interests in Congress…(article continues)

For more on Oregon’s Ballot Measure 114 see this video from Colion Noir:

American Partisan: Basic Sigint Equipment

Former US Army Signal Intelligence Analyst Madman Actual writes about his basic signals intelligence (sigint) equipment in this article from American Partisan.

Here are some basic tools to get you started on your Sigint Ninja journey, young Padawan. From left to right we have: a pen for writing, the Brushbeater RTO TACSOP(Tactical Standard Operating Procedure), above that is the antenna for an RTL-SDR dongle, above that is a manufactured Yagi antenna, below that is a Radioddity(pronounced Radi-oddity, could have swore it was radio-tiddy), below that is my Rite-in-the-Rain notebook, next is the mighty BaoFeng AR-152, my AMD Ryzen 3 powered Lenovo Laptop, a Sig 365XL because guns are cool and my finally my morning coffee.

Now that the run on sentence is complete, let’s talk SIGINT. The point of this little exercise is firstly, a functions check for my gear, and to give you a nice look at what can be used effectively. You don’t need all of these but you do need at least two. You NEED a two-way radio and a directional antenna. Yagi’s work well because of how the antenna is constructed. NC Scout has written extensively on this so I won’t waste time here.

Radioddity GS-5B

This little guy runs about $100 and is very handy to have around. It doesn’t have the transmit power of other radios in the same price range. In fact, the AR-152 is a much more capable communications device and is probably better for direction finding as well. I’m a great salesman, I know. I paid for this dumb little thing for two reasons: It’s rain proof(tested and satisfied) and it has a Received Signal Strength Indicator or “RSSI” on the display. So while you dorks are spinning in circles praying to the Sigint gods, I’ll be making precise movements to find the wascally wabbit. This bad boy has a lot of functionality to include scan mode, dual standby mode, up to 127 channel memory, and a mostly useless Bluetooth function. At least I can’t seem to find a reason to use it.

I’ve tested the 5B at range with omni-directional antennas and the RSSI is quite sensitive. A 2Watt power radio at 1 mile will usually show between a 1 and 2.5 value depending on the frequency used(one shown was used at 1 mile), wattage(low on AR-152) time of day and weather conditions(Chilly morning with no visible sun ~40F) A good rule of thumb is that the higher the frequency, the more susceptible the signal is to propagation interference. But this little bar above the frequency is a very handy tool when linked with a well tuned directional antenna. WELL TUNED is key. My trusty Sigint assistant Johnny Paratrooper and I tried this with a manufactured Yagi and while reception was phenomenal, directional sensitivity was lacking severely. A home-made, precisely cut antenna using your handy dandy RTO TACSOP with the cheat sheet will beat anything you can purchase on the web for a reasonable price.

  BaoFeng AR-152

This is functionally the same transceiver as the BaoFeng UV-5R and the like. Scanning speed is sub-par to dedicated scanners, but certainly is enough to get the job done. It also seems to be a bit more sensitive with higher squelch settings(1-5). I’m not sure if this is the antenna that comes with it but the Yagi just makes it all the better. We used this and the Yagi setup in the SIGINT Course taught by NC Scout and it works well. I highly recommend this combo for newer pupils to Radios and direction finding. It’s so easy, a caveman can do it.

Software Defined Radio(SDR)

Here we have the SDR Airspy waterfall display. We were transmitting 462.562, if you’ll notice the spike graph has a mound with a heavy spike. That’s what it looks like with a very strong signal, this particular one was within 2 feet of the SDR rabbit ear antenna. And you’ll see on the waterfall this is mirrored with the thick red line surrounded by the yellow coloring. This is simply a graphical representation of the Carrier Signal’s bandwidth being broadcast from the transmitting device, this was an AR-152 on Low power. You can see to the right on the waterfall display that around 464.200 there is some activity. This started exactly when began transmitting on 462.562, curious indeed. I transmitted in my living room with windows and mirrors and all sorts of things to bounce that signal all over.

When this happens, the mysterious phenomenon I call Signal Doppelganger occurs. Receivers will hear the same transmission but will appear as two separate frequencies on displays such as this. Clearly, one is the true signal, the other is a filthy imposter only there to confuse and disorient newbies. If you heard this with your UV-5R, you may be convinced that you got em’ but they’re too far away which is why the signal is so broken and barely readable. You’d be chasing a ghost.

Wrap Up

All considered, I highly suggest you start with a cheaper radio like the BaoFeng lineup of  UV-5R, 82L, AR-152 and many more. If you feel like forking over a Benjamin, the Radioddity GS-5B isn’t a bad choice either with the RSSI. SDR’s are NOT tactical but very useful for the Homestead or in a truck being used for Sigint Area Studies. A good Sigint Team uses a combination of tools and could be a nightmare for street commies and even a more professional force with some training and coordination. The RTO/Advanced RTO and Sigint class shows you how to use a digital tablet and an analog radio to play games with enemy communications, the Tactical Sigint Exploitation will show you some strategy and more tricks on making an effective Low Level Voice Intercept Team.

Radio Contra: Ep. 193 Brent Weir of Project 22:3 Preparedness Podcast

In Radio Contra Episode 193, NC Scout of Brushbeater talks to Brent Weir of Project 22:3 Preparedness Podcast. They talk faith, community building, practical preparations, and overcoming adversity in the world to come in the face of covid, war, and economic disaster.

Radio Contra Ep. 193: Brent Weir of Project 22:3 Preparedness Podcast

Mises Institute: Law, Praxeology, and Unintended Moral Decay

Attorney Robert Zumwalt at the Mises Institute writes about laws as an attempt to control individual choices, morals, and actions in Law, Praxeology, and Unintended Moral Decay. An excerpt is below, but it is worth checking out the article for context.

…Devlin argued, in his 1959 lecture, “The Enforcement of Morals,” that systems of laws are necessary to preserve a society’s “common morality,” which he believed was necessary to prevent the society’s “disintegration.” To him, this concern justified passage of legislation regulating the conduct of individuals’ lives. In his view, societies are justified in enforcing a common morality through legislation because this common morality is necessary for their own preservation.

To be fair, there is something admirable in Devlin’s analysis of the function of a common morality within society:

For society is not something that is kept together physically; it is held by the invisible bonds of common thought. If the bonds were too far relaxed, the members would drift apart. A common morality is part of the bondage. The bondage is part of the price of society; and mankind, which needs society, must pay its price.

However, Devlin did not stop at this basic observation that a natural means by which societies remain bonded is through a shared morality. He proposes that this need for a common morality justifies the imposition of legislation regulating individual conduct:

If society has the right to make a judgement and has it on the basis that a recognized morality is as necessary to society as, say, a recognized government, then society may use the law to preserve morality in the same way as it uses it to safeguard anything else that is essential to its existence. If therefore the first proposition is securely established with all its implications, prima facie society has the right to legislate against immorality as such.

There is an unspoken assumption at work here, however, which is that legislation against immorality does in fact strengthen moral bonds within societies. Unlike purely theoretical legal systems confined to academic literature, actual legal systems are subject to the reality that the societies they govern are composed of individuals who act to satisfy their own chosen ends. Viewed from this praxeological perspective, a strong case can be made that vigorous legislation is at least as likely to degrade social morals as it is to improve them.

Proponents of theories like legal moralism seem to assume as a starting point that men can be made to follow certain moral patterns just because the law directs them to. But laws do not change the ends men wish to achieve, they only impede men from achieving them. Thus, if the law forbids the sale of alcohol on Sundays, the result for some men will not be that they drink less of it, but that they will buy more of it on Saturdays and Mondays.

If hard liquor is outlawed, they will drink more beer or wine. If alcohol is prohibited altogether, some will evade legal enforcement. And those who do end up drinking less will not do so because the law has awakened in them a realization of the immorality of alcohol. They will do so only because they prefer to avoid punishment.

Therefore, the idea that legislation of moral behavior will induce a desired moral character in society ignores that individual men do not act for the purpose of fulfilling the “higher principles” for which the state passes its laws…

This is not an argument against societies pursuing shared moral values, nor necessarily against societies enacting laws that reflect moral values already universally agreed upon. But it is evident that moral values come from the individuals who make up a society, not from the edicts that legislators hand down from above. This brief praxeological exercise suggests that the meticulous legislation of modern regulatory states may in fact engender moral decay, as cynical compliance with bare law comes to replace respect for a shared morality as the overriding characteristic of society.

Medium: US Government Sees Silicon Valley As Part Of Its Propaganda Machine

Caitlin Johnstone at Medium.com writes The US Government Sees Silicon Valley As Part Of Its Propaganda Machine

The Biden administration is reportedly considering opening a national security review of Elon Musk’s business ventures which could see the plutocrat’s purchase of Twitter blocked by the White House, in part because Musk is perceived as having an “increasingly Russia-friendly stance.”

Bloomberg reports:

Biden administration officials are discussing whether the US should subject some of Elon Musk’s ventures to national security reviews, including the deal for Twitter Inc. and SpaceX’s Starlink satellite network, according to people familiar with the matter.

US officials have grown uncomfortable over Musk’s recent threat to stop supplying the Starlink satellite service to Ukraine — he said it had cost him $80 million so far — and what they see as his increasingly Russia-friendly stance following a series of tweets that outlined peace proposals favorable to President Vladimir Putin. They are also concerned by his plans to buy Twitter with a group of foreign investors.

The “group of foreign investors” the Biden administration is reportedly worried about oddly includes Prince Alwaleed bin Talal of Saudi Arabia, who has already been a massive Twitter shareholder for years. The White House certainly never had a problem with foreign investors there before.

“Officials in the US government and intelligence community are weighing what tools, if any, are available that would allow the federal government to review Musk’s ventures,” Bloomberg writes. “One possibility is through the law governing the Committee on Foreign Investment in the United States [CFIUS] to review Musk’s deals and operations for national security risks, they said.”

“Musk, the world’s richest person, has taken to Twitter in recent weeks to announce proposals to end Russia’s war and threaten to cut financial support for Starlink internet in Ukraine,” says Bloomberg. “His tweets and public comments have frustrated officials in the US and Europe and drawn praise from America’s rivals.”

“If the Twitter acquisition was to be reviewed by CFIUS for national security reasons, the agency could recommend to President Biden that he nix the deal — something Musk himself has tried and failed to do in recent months,” writes Business Insider’s Kate Duffy on the Bloomberg scoop.

Indeed Musk has already indicated that he’d find it funny if the Biden administration blocked his purchase of Twitter, a $44 billion buy that the Tesla executive has made every legal effort to back out of. But how revealing is it that someone could be forbidden by the White House from purchasing a giant social media company on the grounds that they’re not sufficiently hostile toward Moscow?

Neither Bloomberg nor any other mainstream members of the imperial commentariat appear to take any interest in the jarring notion that the US government could end up banning the purchase of an online platform because it views the purchaser as having an unacceptably “Russia-friendly stance.” Not only is it uncritically accepted that the US government mustn’t allow the purchase of a social media company if the would-be buyer isn’t deemed adequately hostile to US enemies, many mainstream liberals are actively cheering for this outcome:

This just says so much about how the US government views the function of Silicon Valley megacorporations, and why it has been exerting more and more pressure on them to collaborate with the empire to greater and greater degrees of intimacy. As far as the US empire is concerned, Silicon Valley is just an arm of the imperial propaganda machine. And empire apologists believe that’s as it should be.

None of this will come as a surprise to anyone who’s been paying attention to things like the drastic escalations in online censorship since the war in Ukraine began, including on Twitter, or the ongoing expansion of internet censorship protocols that were already well underway before this war started. It will also come as no surprise to people whose ears pricked up when the White House summoned top social media influencers to a briefing in which they were instructed how to talk about the Ukraine war. It will also come as no surprise to those who paid attention to the public outcry when it was discovered that the Biden administration was assembling a “disinformation governance board” to function as an official Ministry of Truth for online content, or when the White House admitted to flagging “problematic posts” for Facebook to take down, or when Mark Zuckerberg admitted that the censorship of the Hunter Biden laptop October surprise in the last presidential race was done in conjunction with the FBI.

It is abundantly clear to anyone paying attention that Silicon Valley tech companies are a major part of the imperial narrative control system. The US empire has invested in soft power to an exponentially greater degree than any other empire in history, and has refined the science of mass-scale psychological manipulation to produce the mightiest propaganda machine since the dawn of civilization. Silicon Valley is being used to manipulate the way people think about world events via algorithm manipulation, censorship, and sophisticated information ops like Wikipedia in an entirely unprecedented way that is becoming more and more important to imperial control as the old media give way to the new.

Narrative control centers like Silicon Valley, the news media and Hollywood are just as crucial for US imperial domination as the military. That the US government is weighing intervention to stop the purchase of an online platform, because it lacks confidence that the would-be owner would reliably advance US information interests, is just the latest glimpse behind the veil at the imperial agenda to control human understanding and perception.

Decentralized Legal System: War on Crypto Privacy Intensifies

The Decentralized Legal System recently wrote an article titled: The War on Crypto Privacy Intensifies. Automatic Reporting of All Trades and Transactions Soon Mandatory.

Massive overreach of international regulators to force all service providers in the industry to:

  • Record ALL crypto trades on exchanges, DEFI and DEXs;
  • Record (large) purchases from private wallets;
  • Record all transfers to cold storage and make lists with private wallet addresses;
  • Send all this info annually to the (tax) authorities;
  • And finally, force governments to pass these rules into domestic law.

The war on privacy continues. The aim: to tackle anonymous spending and exchanging of crypto.

As you’ll discover, these new regulations force upon us a system of complete surveillance and control.

This report explains exactly what to expect from the latest developments launched in October 2022…

What is Going On?

​ Last year, the crypto world was shaken to its core when the Financial Action Task Force (FATF), acting in behalf of the G20, released their guidance on virtual assets.1)

This document laid out a set of rules regarding stablecoins, distinctions between private and hosted wallets, extensive KYC requirements, the tackling of privacy tools, and more.2) FATF has also provided a final definition of the type of service provider tasked with reporting on crypto: the Virtual Asset Service Provider.

Fast forward to today, and these rules are quickly being implemented across the world.3) But as usual, it didn’t stop there. Another international regulator, the OECD, is already building on this framework in an attempt to massively increase the grip of authorities on crypo.

What is the OECD?

The Organisation for Economic Co-operation and Development (OECD) is a Paris-based international organisation that works to “build better policies for better lives.” Its goal is to shape policies that foster prosperity, equality, opportunity and well-being for all.4)

Together with governments, policy makers and citizens, the OECD works on finding solutions to a range of social, economic and environmental challenges. From improving economic performance and creating jobs, to fostering strong education and fighting international tax evasion. The organisation provides a unique forum and knowledge hub within which to discuss and develop public policies and international standard setting.5)

This “international standard” setting is what we will look at next.

Automated Exchange of Financial Information with Authorities Since 2014

In 2014, the OECD published the Standard for Automatic Exchange of Financial Account Information in Tax Matters.6) This publication created a “Common Reporting Standard” (CRS), which forces financial institutions to automatically exchange account information with the authorities of the country of residence of their account holders. The goal: to prevent persons from holding financial accounts in offshore jurisdictions and not reporting them back home.

This is why all financial service providers request utility bills: they prove where you live, and hence where they have to report to.

All financial institutions that are subjected to these regulations are forced to automatically report to the authorities the name, address, Tax Identification Number(s), date and place of birth, the account number, and the account value as of the end of the relevant calendar year (or other appropriate reporting period).7)

Now, there is no more hiding of accounts held with a foreign financial institutions. The authorities enlisted all financial institutions as involuntary (but powerful) assistants in collecting facts and evidence needed for tax compliance.

The Panama Papers; Just in Time to Boost Worldwide Implementation of Automated Reporting…

After publishing their standards in 2014, the OECD needed to get countries and their financial institutions in line. By August 2015, the OECD had released the first version of a CRS Implementation Handbook.8) It provided practical guidance to assist government officials and financial institutions in implementing CRS.

But while the standards set by the OECD came into force in 2016 in early-adopting states, by March of that year these standards were still far from being fully integrated into the global financial system.9) This was especially true in the offshore jurisdictions that were the main target. What was needed was a shift in conscience…

On April 3rd, 2016, the International Consortium of Investigative Journalists published a giant leak of offshore financial records, better known as the Panama Papers.10) These revelations caused public outrage.

The G5, the five largest Western European countries, were quick to jump on the bandwagon and call for more international cooperation to tackle “tax dodging and illicit finance.”11) The message did not fall on deaf ears; the next day, on April 15th, G20 Finance Ministers and Central Bank Governors met in Washington and issued the following Communiqué:

“…we call on all relevant countries including all financial centers and jurisdictions, which have not committed to implement the standard on automatic exchange of information by 2017 or 2018 to do so without delay and to sign the Multilateral Convention. We expect that by the 2017 G20 Summit all countries and jurisdictions will upgrade their Global Forum rating to a satisfactory level. We mandate the OECD working with G20 countries to establish objective criteria by our July meeting to identify non-cooperative jurisdictions with respect to tax transparency. Defensive measures will be considered by G20 members against non-cooperative jurisdictions if progress as assessed by the Global Forum is not made.”12)

Thus, within 12 days of the publication of the Panama Papers, the world’s 20 most powerful governments had collectively agreed to start pushing CRS reporting requirements aggressively, and to punish non-cooperative (offshore) jurisdictions—regardless of their local laws.

This is how offshore finance was brought into the fold, and financial privacy died.

Why Can the OECD Regulate Financial Institutions Around the World? Isn’t this a Task of Democracy?

The OECD isn’t a government agency of any individual country. As such, it cannot create law. It issues what is known as “soft laws,” or “recommendations” and “guidance.” Only when this guidance is transposed into the laws of individual countries does it becomes “hard” law, with real world power.

In theory, this process is subjected to the formal (democratic) law-making processes of the implementing countries. However, countries that don’t participate face restricted access to the financial system and ostracism from the international community. For this reason, almost all nations are compelled to implement these recommendations.

It must also be said that national governments, especially in the Western world, highly value this kind of international cooperation, and the control it gives them without the need to deal with the “inconveniences” of democracy. They simply hide behind the fact that these are “international standards” which they have to follow because “everybody” does.

Neither does it help that few of our representatives, journalists and fellow citizens seem to understand the impact of these treaties. Those in the legal industry who do understand the implications just look at it as “business as usual” and a new way to generate income. As such, most standards are passed into domestic law with little opposition or delay.

International Standards Aim to Supersede National Law

Once these treaties are accepted, they become part of a body of law called “international law,” which in many cases supersedes national laws. Unknown to the general public, international law is increasingly being used as a backdoor for passing invasive regulations such as those we are discussing here, and establishing a global bureaucracy with real power over our (financial) lives.

It is also worth noting that the people working for this Paris-based institution have not been elected, their procedures and budget are not subjected to democratic oversight, and they are almost impossible to remove from power.

Like most international organizations, their operations fall under the Vienna Conference on Diplomatic Intercourse and Immunities.13) As such, they enjoy immunity for their actions taken whilst in office, are exempt from administrative burdens (such as taxes and fines), and enjoy less stringent (COVID) travel restrictions.

AUTOMATIC Exchange of Transaction Info For Crypto

Last October 10th, the OECD published the “Crypto-Asset Reporting Framework and Amendments to the Common Reporting Standard.”14) This applies the tax reporting guidance of the existing CRS to crypto―and makes it FAR more invasive…

The OECD first published a public consultation version of the document on 22nd March 2022.15) The deadline for feedback from the public was 29th April 2022. This gave the public just over a month to analyze a 101-page document, figure out what it meant for them and their clients in multiple jurisdictions, and formulate a public statement on company letterhead.

This is not a sign that the OECD takes public input seriously. When comparing the two documents, there is no material difference between the public consultation and the final version in the section that matters most, the actual rules…16)

Public consultations give these recommendations the appearance of being widely supported by “stakeholders.” It creates the illusion that the public has a say in the matter. It doesn’t. When you read the questions carefully, they only seek feedback on details, such as which intermediaries are to be included or excluded, which type of NFTs are to be in scope, what reporting thresholds there should be, and how much time should be reserved for implementation.17)

Furthermore, if you read the commentaries submitted, which can be downloaded here, most respondents just talk their own book, trying to elicit amendments that perhaps exempt them from a specific reporting requirement, or trying to get a longer time-frame for implementation. In all fairness, there were also a number of industry insiders who highlighted the double standards created for the crypto industry, and how much of a burden the regulations would represent. In the end, none of this mattered. The regulations have been published and are now the new worldwide standard…(article continues, click here)

Doom and Bloom: Tetanus

The Altons at Doom and Bloom Medical have an article up about tetanus and its causes and treatment. More photos in their original article. Go there and read more about emergency and off-grid medical care.

The destruction caused by hurricane Ian in Florida recently was widespread and devastating. Flood waters teeming with contaminants and debris posed a hazard to all who ventured out after the storm. You can bet that there was a run on tetanus shots after citizens had a painful encounter with the proverbial “rusty nail” and other objects. In off-grid settings, tetanus is an ever-present risk. The family medic should have knowledge of risks, symptoms, treatment, and prevention.

What is Tetanus?

Tetanus (from the Greek word tetanos, meaning tight)  is an infection caused by the bacteria Clostridium tetani.  The bacteria produces spores (inactive bacteria-to-be) that primarily live in soil or the feces of animals. These spores are capable of laying dormant for years and are resistant to extremes in temperature.

Tetanus is relatively rare in the United States, with about 50 reported cases a year.  Worldwide, however, there are more than 500,000 cases a year. Most are seen in developing countries in Africa and Asia.  Still, we should realize that developed countries may be thrown into third world status in the aftermath of a mega-catastrophe.  There’ll be many more cases that could be your responsibility as medic to identify and treat.

Causes of Tetanus

Most tetanus infections occur when a person has experienced a break in the skin.  The skin is the most important barrier to infection, and any breach in the armor leaves a person open to infection. The most common cause is some type of puncture wound, such as an insect or animal bite, a splinter, or even that rusty nail.  This is because the bacteria is anaerobic (doesn’t like oxygen); deep, narrow wounds are exposed to less O2, providing a favorable environment for C. tetani. Any injury that compromises the skin, however, is eligible: Burns, crush injuries, and lacerations can also be entryways for tetanus bacteria.

Tetanus spores

When a wound becomes contaminated with Tetanus spores, the spores become full-fledged bacterium and reproduce rapidly.  Damage to the victim comes as a result of a strong toxin excreted by the organism known as tetanospasmin.  This toxin specifically targets nerves that serve muscle tissue.

Tetanospasmin binds to motor nerves, causing “misfires” that lead to involuntary contraction of the affected areas.  This neural damage could be localized or can affect the entire body. You would possibly see the classical symptom of “lockjaw”, where the jaw muscle is taut; any muscle group, however, is susceptible to the contractions if affected by the toxin.  This includes the respiratory musculature, which can inhibit normal breathing and become life-threatening.

The most severe cases seem to occur at extremes of age, with newborns and those over 65 most likely to succumb to the disease. Death rates from generalized Tetanus hover around 25-50%, higher in newborns.

You will be on the lookout for the following early symptoms:

  • Sore muscles (especially near the site of injury)
  • Weakness
  • Irritability
  • Difficulty swallowing
  • Lockjaw (also called “trismus”; facial muscles are often the first affected)

Initial symptoms may not present themselves for one to two weeks. As the disease progresses, you may see:

  • Progressively worsening muscle spasms (may start locally and become generalized over time)
  • Involuntary arching of the back (sometimes so strong that bones may break or dislocations may occur!)
  • Fever
  • Respiratory distress
  • High blood pressure
  • Irregular heartbeats

Complications of untreated tetanus can lead to a fatal outcome in one out of four people. The death rate for newborns is even higher. 

Treating Tetanus

The first thing that the survival medic should understand is that, although an infectious disease, tetanus is not contagious. You can feel confident treating a tetanus victim safely, as long as you wear gloves and observe standard clean technique.  Begin by washing your hands and putting on your gloves.  Then, wash the wound thoroughly with soap and water, using an irrigation syringe with 3% hydrogen peroxide to repeatedly flush out any debris.  This will, hopefully, limit growth of the bacteria and, as a result, decrease toxin production.

You will want to administer antibiotics to kill off the rest of the tetanus bacteria in the system.  Although not used as prevention, antibiotics will decrease the toxin load and speed recovery. Metronidazole (Aqua-zole, Flagyl) 500mg 4 times a day or Penicillin 500 mg 4 times a day are among some of the drugs known to be effective.  Muscle relaxants like tizanidine and cyclobenzaprine are used to treat spasms, but are unlikely to be available to the off-grid caregiver.

Additional strategies include IV hydration, if available, and keeping the patient as comfortable as possible in a quiet and dimly-lit environment.

Late stage Tetanus is difficult to treat without modern technology. For this reason, it’s important for the survival medic to monitor anyone who has sustained a wound for the early symptoms mentioned earlier.

As medic, you must obtain a detailed medical history from anyone that you might be responsible for in times of trouble.  This includes immunization histories where possible.  Has the injured individual been immunized against tetanus? Most people born in the U.S. will have gone through a series of immunizations against diptheria, tetanus, and whooping cough early in their childhood. Booster injections for tetanus are usually given every 10 years (or if 5 years have passed in a person with a fresh wound, sometimes along with tetanus Immunoglobulin antitoxin).

Tetanus vaccine is not without its risks; severe complications such as seizures or brain damage occur in rare cases (less than one in a million).  Milder side effects such as fatigue, fever, nausea and vomiting, headache, and inflammation in the injection site are more common.

Given the life-threatening nature of the disease, though, this is one vaccine that you should encourage your people to receive, regardless of your feelings about vaccines in general. If not caught early, there may be little you, the off-grid medic, can do to treat your patient without all the bells and whistles of modern medicine.

Joe Alton MD

Survivalist Prepper: Prepping Groups & Large Scale SHTF

Survivalist Prepper talks with Titan Preparedness about Prepping Groups and Large Scale SHTF.

Survivalist Prepper Ep. 349: Prepping Groups & Large Scale SHTF with Titan Preparedness

Joining or forming a prepping group has always been a challenge when it comes to putting together our preparedness plans. There are a number of factors that go into this, and today Titan Preparedness and I dig into the subject. 

We also went over the different levels of disaster, and what we might expect from them. While the smaller and most likely events are easily overcome, the larger SHTF-type scenarios become more complicated.

Anarchists Publish SecOps Guidelines

According to info sharing and analysis centers, anarchists published a new handbook focused on developing secure communications infrastructure on 6 October 2022.

According to Welund, anarchists produced a new handbook focused on developing secure communications infrastructure in early October 2022 [1]. In this publication, called The P.E.T. Guide: New Communication Infrastructure for Anarchists [2], fundamental methods and structures for protecting digital communications are established:

  1. Peer-to-peer: messages are not routed through a centralized server as with Signal and other common communication interfaces, effectively discarding the ability to collect most relevant metadata.
  2. Encrypted: intercepting messages become useless because it is data is only readable by sender and receiver.
  3. Tor: uses anonymous networks with multiple hubs to communicate data, thereby anonymizing the sender.

Given that digital communication is essential for “coordinating, collaborating, and staying connected” [2], anarchists are calling for continuous scrutiny and review of existing digital communication platforms and practices in an aim to strengthen group resilience, security, and enhance effectiveness. This text identifies “adversarial capabilities” [2]—i.e. capabilities of local and federal law enforcement and intelligence agencies–related to monitoring and/or intercepting digital communications, dissects vulnerabilities in Signal (app) security, and proposes the use of two alternative digital communication applications; Briar and Cwtch, which mostly mitigate the vulnerabilities addressed.


According to the Center for Strategic and International Studies (CSIS), “anarchists remain a persistent problem in the United States, though they pose a low-level threat—both in terms of lethality and rate of attacks—in comparison to other extremist movements” [3]. However, 92% percent of U.S. militant anarchist attacks and plots recorded since 1994 have been directed at property and infrastructure [3]. As such, for security operators and analysts concerned with detecting and analyzing threats to the bulk electric power system, changes in the communications infrastructure used by domestic extremist groups provide relevant inputs and may help define strategic changes to the intelligence collection process moving forward.

The handbook was posted on October 6, 2022, by the site It’s Going Down,[1] and later shared by sites such as the EarthFirst! Journal,[2] and Anarchist News[3].

Sources:

[1]Welund, “New anarchist secure communications handbook,” 9 October 2022.
[2]Anonymous, “The P.E.T. Guide: New Communication Infrastructure for Anarchists,” [online], 2022.
[3]G. Hwang, “Examining Extremism: U.S. Militant Anarchists,” Center for Strategic and International Studies, Washington, D.C., 2021.

[1] hxxps://itsgoingdown[.]org/the-guide-to-peer-to-peer-encryption-and-tor-new-communication-infrastructure-for-anarchists/ (defanged)

[2] hxxps://earthfirstjournal[.]news/2022/10/08/the-guide-to-peer-to-peer-encryption-and-tor-new-communication-infrastructure-for-anarchists/ (defanged)

[3] hxxps://anarchistnews[.]org/content/new-communication-infrastructure-anarchists (defanged)