Custer County, CO Puts All County Commissioners Up for Recall

As an example of what citizens can do locally to make a difference in their lives and their community, here is a story from Sangre de Cristo Sentinel  about how the citizens of Custer County, Colorado have delivered recall petitions sufficient to put all three of their county commissioners up for recall this fall.

Monday, August 14, 2017, marked a milestone in Custer County politics as the Take Back Custer County Recall Committee delivered 236 notarized recall petitions with enough signatures to have a recall election for each of the three Custer County Commissioners, Bob Kattnig, Jay Printz and Donna Hood. The recall election would be placed on the regular November 2017 election ballot at no extra cost to the county.

Read the entire article here

The Market Ticker: Editorial on Free Speech

Source: Kart Denninger at Market-ticker.com

To The Press, The Pols And The Rest

Let me say this just one more time:

That someone is a Neo-Nazi, a White Supremacist, KKK member or racist does not render them bereft of the First Amendment.  Just as being a member of BLM or the Antifa does not render them bereft of the First Amendment.

It is not acceptable, legal or excusable to meet speech by any such person with violence.

Period.

To suggest, state, or advocate that such is the case, or to promote the premise that violence is an appropriate remedy for speech you find vile and outrageous is to declare civil war, because there are others who will likely find your speech vile and outrageous and by your statement you have made the claim that just punishment for speech you deem vile is to be found at the hands of a mob.

The press and now lawmakers are openly advocating for the complete breakdown of civil society — they are stating by the droves that violence in response to mere speech that one finds offensive yet has the protection of the First Amendment is not only worthy of said violence the person uttering same is not worthy of having their assailants prosecuted or the protection and investigation of the police forces to interdict violence intended for or served upon them

Continue reading by clicking here

Preparing for Nuclear Disaster (or not) and N. Korea

Civil defenseFrom Herschel Smith at captainsjournal.com comes this article discussing Preparing for Nuclear Disaster and dealing with some myths and bad information involved with the same. He also opines about the possibilities (or lack thereof) of nuclear war with North Korea.

Let’s discuss a few things concerning radiation, radioactivity and nuclear events.  If you’re a layman, most articles you will read on these subjects will either be written way above your head, or by people who only pretend to know what they’re talking about because they lack the proper education and experience to speak intelligently.  Even the man who wrote this article on surviving a nuclear attack is in that category.

I could wax haughty and throw words around showing what I know about photon, electron and neutron shielding, the theoretical and mathematical difference between a Rad, Roentgen and a Rem, committed dose equivalent to organs, total effective dose equivalent, albedos, Keff (criticality) calculations, the Boltzmann transport equation and reactor kinetics.  But it would do you precisely no good.  None.  You wouldn’t be one bit better off after having read an article like that than you are right now.  You would have to take an advanced engineering degree or train in the radiological sciences in order to stay with me in such a discussion, and you can’t right now, so that’s that.  Something else needs to be done because the conversation the “journalist” had with that prepper above is off the charts stupid.

Potassium Iodine, or KI, doesn’t stop the thyroid from “absorbing radiation.”  It isn’t a magic radiation pill, regardless of how pepper and survivalist web sites market it.  There is nothing magic about it.  There is a little bit it can do under the right circumstances, and it can’t do anything else.  If you take it – and be aware that taking KI when you don’t need it can lead to severe health problems, especially in the young and old – it will load your thyroid with iodine and prevent the absorption of any more iodine, radioactive or not.  The intent behind this is to prevent radioactive iodine from being absorbed by the thyroid and thus the absorbed radiation dose from such a localized source.

What it doesn’t do is prevent the thyroid from “absorbing radiation.”  The entire whole body, including every organ in your body and the skin (which is treated as an organ by the ICRP) will still attenuate and absorb radiation from external sources, such as immersion in a cloud of radioactive material.  Charged particles (such as betas, or in other words, electrons) can be essentially stopped by clothing, skin and just a little tissue overlying the organs.

You cannot wear enough shielding to stop gammas or neutrons, although being inside a structure deep in the ground could help…

Read the entire article at The Captain’s Journal by clicking here

AmRRON Advances to AmCON 3 – Aug. 8, 2017

Today, AmRRON announced that it had moved the organization to level AmCON 3.  Level 3 means that an incident is considered probable which would interrupt conventional communications, but not necessarily imminent.

*08 AUG 2017 UPDATE: *

Due to the increased probability of armed conflict with North Korea,
which is now nuclear-capable and could strike American cities on the
mainland, we are increasing our readiness levels and the AmRRON
Readiness Condition Level to 3. This means that while disruptions to
conventional communications are by no means imminent, there is an
increased probability.

https://www.cnbc.com/2017/08/08/trump-warns-north-korea-threats-will-be-met-with-fire-and-fury.html

Trump warns North Korea threats ‘will be met with fire and fury’

* President Donald Trump warns that threats from North Korea “will be
met with fire and fury like the world has never seen.”
* North Korea has successfully created a miniaturized nuclear weapon
that can fit in its missiles, according to NBC News and The
Washington Post.

*Note from JJS: * This is significant. President Trump is warning that
these continued threats must stop and that he is prepared to carry out
military action. Previous attitudes and responses indicate that North
Korea will continue to agitate the US and other nations. Essentially,
Trump must make good on his word. If he does not, it will only embolden
North Korea and increase the danger to US citizens and interests, as
well as our allies. Essentially, it appears the time for talking and
negotiating are over. We’ll see. Boy Scout’s motto: “Be Prepared”

————————————

*Additionally, the previous open source (OSINT) information which
prompted us to raise to Level-4 several weeks ago is still relevant:*
/////END OF MESSAGE/////

chart

Ben Yu: Cryptocurrency 101

Over at Medium.com, Ben Yu has written a cryptocurrency primer called Cryptocurrency 101. It is a long read, but it has much good history and other background information to enhance your understanding of the reason for and value of cryptocurrencies.

Bitcoin was designed, essentially, as a better ‘digital gold’. It incorporates all of the best elements of gold — its inherent scarcity and decentralized nature — and then solves all the shortcomings of gold, in allowing it to be globally transactable in precise denominations extremely quickly.

How does it do this? In short, by emulating gold’s production digitally. Gold is physically mined out of the ground. Bitcoin is also ‘mined’, but digitally. The production of bitcoin is controlled by code that dictates you must find a specific answer to a given problem in order to unlock new bitcoins.

In technical terms, bitcoin utilizes the same proof-of-work system that Hashcash devised in 1997. This system dictates that one must find an input that when hashed, creates an output with a specific number of preceding zeros, among a few other specific requirements.

This is where the ‘crypto’, incidentally, in cryptocurrency comes from. Cryptographic hash functions are fundamentally necessary for the functioning of bitcoin and other cryptocurrencies, as they are one-way functions. One-way functions work such that it is easy to calculate an output given an input, but near impossible to calculate the original input given the output. Hence, cryptographic one-way hash functions enable bitcoin’s proof of work system, as it ensures that it is nigh-impossible for someone to just see the output required to unlock new bitcoins, and calculate in reverse the input that created that output.

Read the entire article by clicking here

Fire Near Mabton Could Be Contained This Evening, July 31st, 2017

From the Yakima Herald

Update 1:45 p.m. Containment could come as soon as this evening, a spokesman for the state Type 3 management team handling the fire said.

Firefighters from the U.S. Bureau of Land Management, state Department of Natural Resources, Yakima, Kittitas, Clark, Okanagan counties and contractors spent Monday strengthening the lines around the fire and mopping up hot spots, said spokesman Guy Gifford.

The state incident management team assumed command of the fire at 6 a.m. Monday.

The fire is burning 2 miles southwest of Mabton.

Update 10:40 a.m. The fire southwest of Mabton is now estimated at 10,000 acres.

High temperatures throughout the day are expected to pose a hazard to fire crews, according to a news release from the Incident Response Team.

Parts of Glade Road within the fire perimeter are closed.

Update 10:25 a.m.: The Glade 3 fire is at 20 percent containment, and crews are expected to bring it into full containment Tuesday, said Guy Gifford, spokesman for the state Type 3 Incident Command Team in charge of the fire.

“We have a lot more fire fuel because of the wet spring,” Gifford said. The fire is burning through grass and sagebrush on slight slopes.

A total of 191 firefighters are working the fire, with 29 engines, three hand crews and three water tenders.

An outbuilding was destroyed by the fire, but no one has been injured, Gifford said.

Prosser Blood Drive, July 21st, 2017

If you are able, please consider donating blood.  The Red Cross will be at Friendship Baptist Church for a blood drive on Friday, July 21, 2017.

Date: Friday, July 21, 2017
Time: 12:00 – 5 p.m.

Friendship Baptist Church
1801 Patterson Rd
Prosser, WA 99350

There is a critical need for blood donors now. In fact, someone is counting on you at this very moment to give the gift of life.  All blood types are needed, but type O negative donors can make the difference between an adequate blood supply and a shortage.

You can schedule an appointment to give blood through this link.  Click that link then click Friendship Baptist Church and choose a donation type and time.

How “Nothing to Hide” Leads to “Nowhere to Hide”

From The Daily BellHow “Nothing to Hide” Leads to “Nowhere to Hide” – Why Privacy Matters in an Age of Tech Totalitarianism

Would you allow a government official into your bedroom on your honeymoon? Or let your mother-in-law hear and record every conversation that takes place in your home or car – especially disagreements with your husband or wife? Would you let a stranger sit in on your children’s playdates so that he could better understand how to entice them with candy or a doll?

Guess what? If you bring your phone with you everywhere, or engage with a whole-house robo helper such as Alexa or Echo or Siri or Google, you’re opening up every aspect of your life to government officials, snooping (possibly criminal) hackers, and advertisers targeting you, your spouse and your children…

When you ask Siri or Echo or Alexa or Google (and others of their ilk) something, it’s great to get an immediate answer… but the corollary is that Siri and Echo and Alexa and Google are listening to every conversation you’re having with your spouse, every fight you’re having with your kids, and every bit of heavy breathing that might be taking place in the dark.

That response inherently grants legitimacy to the search in the first place. The implication is that if you have nothing to “hide,” then the tech companies, the advertisers, the government, etc. should indeed have full access to every aspect of your life…

Technology can lead to convenience, but it can also lead to abuses of power. In its extreme, that is called totalitarianism.

In the end, we must take precautions if we’re to have anything close to liberty. Some of you have, no doubt, read Jonah Goldberg’s excellent book from 2007, Liberal Fascism, the hardcover of which features a smiley face graphic with a Hitler mustache. In the introduction, Mr. Goldberg quotes a segment from a Bill Maher show in which George Carlin says, in essence, (and I’m paraphrasing) that “when fascism comes to America it will be wearing a smiley face.”

I’d go a step further — it will be cloaked in an emoji seemingly innocuous, friendly, and ubiquitous.

We must stop giving away our privacy. We must start thinking about personal “data” as the commodity that it already is, and even as a weapon that can be used against us.

If we don’t stop and reconsider what we’re giving away, not only will there be nothing to hide, but nowhere to hide.

Read the entire article here

South Africa: “Expropriation Without Compensation” May Be Enacted

South Africa’s ANC party recently concluded a six day meeting discussing various issues.  According to the Sunday Times:

There was a hard push from supporters of President Jacob Zuma for a decision on the redistribution of land without compensation‚ which would necessitate a change to the constitution.

But according to the ANC’s economic transformation subcommittee head‚ Enoch Godongwana‚ both this proposal and the current system of redistribution with compensation remain on the table for debate by branches. Zuma‚ however‚ hinted in his closing address that there could be legislative changes for expropriation without compensation.

“We agree that using the fiscus for land redistribution must be accompanied by other measures if we are to achieve the goal at the required pace.

“Where it is necessary and unavoidable this might include expropriation without compensation‚” Zuma said.

The ANC also agreed that the South African Reserve Bank should be nationalized.  The decisions are not binding and must be approved by the December national elective conference.

Click here to read more.

How To Avoid the Plague

Perhaps you’ve read in the news lately about the current, big virus sweeping across Europe.

Cryptoviruses (a computer virus that encrypts a victim’s data in a way that the data can only be retrieved via a key made by the attacker) are the current weapon of choice of those bent on using malware to either cause electronic destruction or criminally extort money from anonymous reaches of the internet. In 2016, ransomware (a virus that encrypts or otherwise locks away a victim’s data) payments were estimated to hit $1 billion for the year.

The virus currently in the news is called Nyetya:

“After an hour of attempting to spread across the network, computers infected with Nyetya will reboot. After restarting the computers will appear to run CHKDSK (utilised to check the hard drive for errors) but the malware is actually encrypting files. Once this is completed the master boot record (MBR) is overwritten with a custom loader that will display the ransom note on boot.

“The ransom note presented to the user informs them that their files are no longer accessible and that $300 worth of Bitcoin will need to be paid to a specified Bitcoin wallet address in order to get the decryption key necessary to access their files. The user is instructed to e-mail a posteo.net e-mail address with information to identify their Bitcoin payment transaction. Posteo has disabled the e-mail account in question, it is not possible for victims to get decryption keys following payment as a result of this.

“Microsoft confirms that the initial infection vector for this malware was caused by a software update for MeDoc, a Ukrainian tax accounting package, pushed out via a hacked server. There have also been reports of the malware spreading via phishing e-mails.”

Viruses have gone from annoying interruptions which required expensive support to clean your computer of infections, to destructive invasions which destroy all the information on your hard drive. Below are several tips on how to avoid getting infected, but as a home user one of the most important tips is to keep a backup of all of your important data on an external drive of some sort – like a thumb drive, home network drive, or external hard drive – something that isn’t always directly attached to your computer where it could be destroyed by a virus.

Here are a few tips to avoid malware problems both inside and outside work (source is https://blog.exclaimer.com/educate-users-about-email-threats/):

  • Don’t click a link in an email unless you are 100% certain that it is safe to do so. If there is even the slightest doubt, delete it immediately or send it to the Helpdesk (if you have one).
  • Don’t open or respond to emails that look suspicious, unusual or appear to be from someone you don’t know that asks for personal or financial details.
  • Ignore attachments that you weren’t expecting, especially if you don’t know the sender. Many malicious attachments masquerade as Word documents or familiar file types, so check with your IT team if there is any doubt.
  • Check your spam folders regularly in case a legitimate email gets caught in the filter. Whitelist important email addresses so they won’t get filtered in the future.
  • Never give out personal details by email or fill in forms that pop up when you open an email as these will often be phishing attempts.
  • If you haven’t given your address to a business that emails you, do not open or interact with the message.
  • If you get a notice from a financial institution or any other online account stating that you need to upgrade your details or change your password, don’t follow the instructions, but go directly to the institution’s website and see if your account is in order. Financial institutions will never ask for these details over email nor will most other reputable institutions.
  • If you think you might have opened an email with a malicious attachment or clicked or a malicious link, shut down your machine immediately and inform your IT department. They will then be able to isolate that machine from the network and run any necessary scans. If you don’t have an IT department, take it to your local PC technician for a virus check.
  • If you receive an emailed calendar invite from someone you don’t know or it looks suspicious, don’t accept it. If it is from a colleague who is not using a corporate email address, find out it if it is real. In any case, delete the invite just to be certain.`
  • Be careful when logging onto Wi-Fi networks, especially public ones. Always stick with trusted providers and avoid suspicious-sounding SSIDs. Hackers often spoof genuine SSIDs in order to steal passwords and user names.
  • Don’t use the same password for your work email account as your personal one.
  • Avoid posting your work email address in public forums, blogs and websites unless it is absolutely necessary. You will be making it too easy for hackers to get your address and use them for various spamming attacks.
  • Never download any software that has not been approved by your IT department. This could open a backdoor for hackers to gain access to your company’s network and use your computer as part of a botnet that will spew spam across the world. At home, try to stick with reputable software producers or peer-reviewed software that has been checked for problems. If you don’t know, doing an internet search for reviews of a software program will usually produce an abundance of information.

If you don’t have an IT department, here in the Yakima Valley most of the smaller internet service providers and repair shops will be happy to answer your questions on the phone and advise you if they think that you should take your PC to a repair shop. Additional tips can be found here

Autodesk https://redshift.autodesk.com/10-tips-on-how-to-prevent-malware-from-infecting-your-computer/

and here

Malware Bytes https://blog.malwarebytes.com/101/2016/08/10-easy-ways-to-prevent-malware-infection/

and here.

PC World http://www.pcworld.com/article/210891/malware.html

The following YouTube video is a few years old, but the information is as valid today as it was then.

Please take some time to review this information and better protect yourself and your sensitive information. Let’s be careful out there.

Federal Bill Introduced Against Cash and Cryptocurrencies

Senate bill 1241 was introduced last month entitled “Combating Money Laundering, Terrorist Financing, and Counterfeiting Act of 2017.” Simon Black of Sovereignman.com writes a summary.

Recently a new bill was introduced on the floor of the US Senate entitled, pleasantly,

“Combating Money Laundering, Terrorist Financing, and Counterfeiting Act of 2017.”

You can probably already guess its contents.

Cash is evil.

Bitcoin is evil.

Now they’ve gone so far to include prepaid mobile phones, retail gift vouchers, or even electronic coupons. Evil, evil, and evil.

These people are certifiably insane.

Among the bill’s sweeping provisions, the government aims to greatly extend its authority to seize your assets through “Civil Asset Forfeiture”.

Civil Asset Forfeiture rules allow the government to take whatever they want from you, without a trial or any due process.

This new bill adds a laundry list of offenses for which they can legally seize your assets… all of which pertain to money laundering and other financial crimes.

Here’s the thing, though: they’ve also vastly expanded on the definition of such ‘financial crimes’, including failure to fill out a form if you happen to be transporting more than $10,000 worth of ‘monetary instruments’.

Have too much cash? You’d better tell the government.

If not, they’re authorizing themselves in this bill to seize not just the money you didn’t report, but ALL of your assets and bank accounts.

They even go so far as to specifically name “safety deposit boxes” among the various assets that they can seize if you don’t fill out the form…

Click here to continue reading at sovereignman.com

Political Violence is a Game the Right Can’t Win

David Hines at Jacobite writes on how the Right fails to organize, and how it refuses to recognize lessons from the Left.

If there’s one thing righties believe, it’s that they could beat lefties in a fight.

You see this attitude reflected over and over again, to the point that it’s probably something engrained in the right-wing psyche. Pajama Boy vs. tactical deathbeast? Pffft. No contest. Look, righties have the guns, righties have police and they have the military. If one day the balloon ever goes up, righties will just organize behind a leadership of their veterans, coordinate with the active service, give all the lefties free helicopter rides, and live happily ever after. Right?

That’s pretty much what the Confederacy thought about the Yankees, and it didn’t exactly work out well for them.

From the perspective of a mainstream righty who’s a right-to-keep-and-bear-arms guy, this dismissive attitude is remarkably familiar. It’s the same attitude of somebody who buys a gun “just in case” but never goes to the range, which is a great way to discover when somebody kicks your door in at three a.m. that you don’t know the difference between the magazine release and the safety. Organization requires time, communication, networking, and above all practice, and vanishingly few right-wingers are interested in doing the necessary work…

Continue reading at JacobiteMag.com

Florida Sheriff Declares “THIS IS WAR!” Tells Americans To Arm Up

Thanks to SHTFplan.com for bringing this to our attention.

Brevard County Sheriff Wayne Ivey … urged citizens to arm themselves in self-defense saying “this is war.”

He doesn’t mean war in the sense that nukes will be flying, but the war against mass homicides and sociopaths who only seek the destruction of human life.   “What’s next is to fully understand that this is war, and you better be prepared to wage war to protect you, your family, and those around you if attacked,” he said. Ivey stressed that attackers rely on people running, hiding, and waiting for help, rather than fighting back.  And they will use guns, knives, bombs, and even trucks to kill innocents. “What they don’t count on is being attacked themselves, having to become defensive to save their own lives,” Ivey argued.

Click here to continue reading at SHTFplan.com.

Letters from Venezuela: This Is What Life Is Really Like in a Post-Collapse Society

From The Organic Prepper, Letters from Venezuela: This Is What Life Is Really Like in a Post-Collapse Society

You can’t go outside to buy food or supplies or medication because each activity is a high risk and more with a baby. So I stay home as much as I can. There are a lot people outside trying to live normaly, trying to go to work and buy foods and continue there lives. But when you are working or whatever thing your doing you dont know is you will be able to come back home safe… people continues to work to get whatever miserable pay to buy some food. Everything is so expensive. Perhaps the beans and rice are affordable but still not cheap and is so hard to find food. options are limited because of the price… you can only buy one item or two of pasta, rice, like I say the less expensive food , and you have to wait in long long lines at your own risk because there are a lot of fights in this store. imagine tones of people wanting to buy the same product. this have being worst since perhaps about 5 years now… because of scarcity.

Malls and big stores are basicly alone because there are places where “colectivos” use to attack, with bombs and there is a group of about 40 men in motorcicles that have been creating chaos in the whole city, every day the take the city they have plenty of arms and the just go through the city shooting building houses, stealing stores, people on the streets, batteries of cars, everything the want… this situation is far worst that we ever imagine. they kill people every day and they are pay mercenaries from the goverment because no one does nothing. the goverment people is also killing inocents. kids… teenagers, the youth. we are panicking.

To continue reading, click here

Suarez – The “REAL” Solution To Jihadist Knife Attacks

From trainer Gabe Suarez of Suarez International, comes this article The “REAL” Solution To Jihadist Knife Attacks about how to prepare for possible attacks.

In this article, which I am certain will upset the “martial arts” guys, I will discuss the reality of facing a jihadist with a knife bent of “stabbing anyone they see”.  I will discuss “The Jihadist Vehicle Attacks” later.

So here we go –

1).  Forget the fantasy of empty hand defenses: 

2).  Instead of going Jackie Chan, use a weapon:

3).  Always be armed no matter the rules:

4). Learn to be violent:

5).  Learn preemption: 


6).  Keep alert:

There are no secret techniques to defend against the knife by physically frail and empty handed males. It takes violence and weapons. And in that order.

Click here to continue reading