Low-Tech Solutions to High-Tech Tyranny

Published on July 2016 | Categories: Topics, Art & Design | Downloads: 38 | Comments: 0 | Views: 309
of 11
Download PDF   Embed   Report

Comments

Content

Low- Tech Solutions to High- Tech Tyranny

You may get angry or depressed but ultimately this could be one of the most useful things you will read. The accounts below are fictional. But they are all far too close to being true. This is what the world could look like not just in a matter of years, or even months. The world particularly the Western World is, as we've said before, past the mouth of the entrance to Hell. But it's not in deepest, hottest part yet. The world is no longer ambling along the path, however. It's sprinting. Indefinite detentions stripping of citizenship of some denial of re-entry for others. TSA agents moving out from airports to the train station and highways. Anyone who denies the ongoing transformation of the U.S. into totalitarianism at this point is just being willfully stupid. This article shows what things might look like when we get there along with some of the simple things people could do to protect yourself depending on where and who they are. When the economy crashes hard enough and the U.S. government drops all pretense of playing nice with its subjects when; the cameras go up on every street; when the drones fill the skies; when the police and state security agents are everywhere, watching what can you do to protect your privacy and your liberty? Some of these solutions aren't exactly legal, so we can't outright recommend them without the likes of Senators Joe Lieberman and Lamar Smith having us thrown in prison indefinitely without trial. But read carefully, good patron. These fictional accounts may prove to be very useful. Make sure to read below: [Disclaimer: The following is a series of fictional accounts of theoretical situations. However, the information contained within was taken from established scientific journals on covered technology and military studies of real life combat scenarios. We do not condone the use of any of the tactics described within for "illegal" purposes. Obviously, the totalitarian subject matter portrayed here is "pure fantasy", and would never be encountered in the U.S. where politicians and corporate bankers are forthright, honest, and honorable, wishing only the sweetest sugar coated chili-dog best for all of mankind] 1

Imagine, if you will, a fantastic near future in which the United States is facing an unmitigated economic implosion. Not just a mere market crash, or a stint of high unemployment, but a full spectrum collapse driven by unsustainable debt spending and hyperinflationary printing. The American people witness multiple credit downgrades of U.S. Treasury mechanisms, the dollar loses its reserve status, devaluation of the currency runs rampant, and the prices of commodities and imported goods immediately skyrocket. In the background of this disaster, a group of financial elite with dreams of a new centralized economic and political system use the chaos to encourage a removal of long held civil liberties; displacing Constitutional protections they deem "outdated" and no longer "practical" in the midst of our modern day troubles. This group then institutes draconian policies through the executive orders of a puppet president, including indefinite detention, assassination, and even martial law against citizens. For now, let's just refer to them as "The Swedes"…. The Swedes have an extraordinary array of technological tools at their disposal. The kind of equipment dictators like Stalin and Hitler would have killed for literally. This technology is so pervasive and so unprecedented in the history of tyrannical governments that average people shiver at the very thought of resistance. The Swedes seem to be invincible. Some Americans think about escaping to a foreign country before the zealots totally dominate, but ultimately, running is meaningless. The Swedes want a global control grid, not just an American one. Eventually, the expatriates will have to face the music as well. Others believe that they can take their families and hide alone in far off mountains to wait out the storm, but they do not consider what will happen to their country and its principles while they curl up in a ball and pray that the catastrophe does not touch them. They forget that survival is hollow if one finds himself and his culture enslaved in the meantime. And yet others, those who are aware of the consequences of unchecked oligarchy, decide to build communities of liberty minded individuals in preparation for the dangers ahead. They seek local and national solutions, social and political. However, always in the backs of their minds sits the understanding that these situations rarely if ever solve themselves, and rarely if ever end peacefully. Despots only respect one thing Power. Those who refuse to fight back are, in their eyes, nothing but an easy meal, like a wounded animal in a forest of wolves. This third group of awake Americans comes to realize that one day the Swedes will move with severe aggression, and will have to be physically stopped. But how?

2

With modern computer-driven weaponry at their fingertips, any resistance appears futile. Some Americans, though, do their homework, and discover that most successful revolutions against better equipped opponents utilize low tech methods in highly intelligent ways. They study the inherent weaknesses of the enemy weapons platforms using readily available online manuals and scientific journals. They realize that these pieces of equipment costing millions of dollars each can be defeated using methods that cost little more than pocket change. A war of economic attrition ensues, whereby the Swedes find themselves completely dependent on systems that cannot be maintained without substantial financial sacrifice. With each new piece of hardware, comes an even more frustrating strategy of defiance. Here are just a few examples…

CCTV Surveillance Grid
Sam is a Liberty Movement sympathizer caught in the city during the establishment of a hightech surveillance grid in his hometown. The dastardly Swedes relish the idea of being able to keep tabs on every person everywhere. They even establish a database in the heart of Colorado which collates information in real time, allowing them to build and organize files on millions of citizens. The success of this grid depends greatly on the capacity of their CCTV cameras placed in an ever expanding spider's web across heavily populated regions. The cameras use biometric data collected and stored by airport body scanners which the "extremists" often refer to as "naked body scanners". The data allows computers to quickly match specific body signs to identity.

The Swedes told the public that their data would not be saved for future reference, but of course, this was later found to be a lie. It did not take long before the scanners were moved from the airports, to train stations, to bus stations, to federal buildings, to street corners for random shakedowns. Sam knows that if his file is pulled up by one of the cameras, he is in serious trouble, and so makes plans to escape the city limits. With curfews being set earlier and earlier in the evening, he decides to make his move before it is too late. The night vision and thermal vision capabilities on the latest CCTV cameras makes disguise nearly impossible. Makeup and prosthetics help to hide bone structure, and a knee brace helps to change the gait of Sam's walk, but Sam also knows that the thermal filters on the cameras are actually able to see the heat of blood flow through facial arteries, which act as a face fingerprint. There is no low-tech way to forge this face fingerprint. 3

So instead, Sam decides to block the camera system's ability to use thermal vision at all. He does this with a few dollars and a hat, gluing small Infrared LED lightbulbs into the cap along with a tiny battery source. The IR lights drown out the CCTV ability to make any clear distinctions in his face, thus preventing any positive ID. Sam is clever, and plants similar IR devices on other people without their knowledge, diluting the attention of Swedish law enforcement officials who are left wondering if their cameras are malfunctioning or if their city is swarming with "terrorists".

Fingerprint Scanners
Angela is a worker in a Swedish detention facility. At first, she believed that all the people quartered in the facility were terrorists who represented a threat to innocent lives. But, over time, she came to realize that the true innocents were being housed in the prison, most of them detained for no more than criticizing Swedish policy or protesting a political injustice. Angela makes plans to steal confidential information on the camp from her boss' office and hand it over to the resistance. Unfortunately, her boss uses a fingerprint scanner to unlock his door. Luckily, she had done research into fail-test methods for such scanners in scientific and security journals and learned how to make molds using latent fingerprints.

RFID Chips
RFID chipping is all the rage with the Swedes, so of course they were more than keen to introduce the intrusive technology to the U.S. once the control grid was established. The tiny inexpensive chips allowed tracking of nearly everything, from retail habits, to civilian movements, to common monetary transactions. Evan, a computer hobbyist and quiet supporter of the Liberty Movement, found that without certain RFID designations, many goods could not be purchased, at least in bulk. Only Swedish officials had the ability to go anywhere and to buy what they needed. Evan found a solution, not necessarily "low-tech", but easy enough to make using common materials and a basic knowledge of electronics and programming. His idea? Build an RFID Emulator/Cloner. The cloner had the ability to read particular RFID chips, even from a distance, and to then copy their unique signal. Evan was able to clone any chip anywhere and then implant the code on an RFID card or any other item containing a chip, making life easier for him, and information easier to get for others.

GPS Tracking
Evelyn was a political activist and independent journalist before the crash. Her writing had become quite prominent in freedom minded circles, but the dollar had fallen, and with it, the Constitution had been scrapped. Her criticisms of the Swedish controlled government were well known, and she had heard stories of liberty writers "disappearing". She decided to leave the confines of the city to stay with a friend before the noose was tightened completely. As she entered her vehicle and made her way outside the city along backroads, away from the highway and possible checkpoints, she noticed that a nondescript car seemed to be shadowing her from a distance. She made a few unplanned turns, and did not see the car again for twenty minutes. Then, it appeared again, at the very edge of her mirror's field of vision. She realized that she may have a GPS tracking device implanted somewhere in her car, and to find it quickly would be impossible. 4

Thankfully, she had purchased a GPS jamming device months ago, which allowed her to block any GPS transmissions within a small to medium radius. The device was furiously labeled by the FCC as "dangerous" and "illegal to use", however, they remained very easy to buy until the crash. • • • • • http://gpsjammers.net/ http://www.jammerall.com/categories/GPS-Jammers/ http://www.infostream.biz/ http://www.jammer-store.com/ http://www.signalbuster.com/Scripts/default.asp

Electronic Surveillance In General
Whether it is a CCTV camera, or a body scanner, sometimes the best option is not to evade or disguise, but to pull the plug entirely. At least, that was James' point of view after the control grid went into overdrive and he couldn't walk his dog without a blue-shirted Swedish agent fondling him on the sidewalk or forcing him to walk through a body scanner. Finally, he had had enough, and so, decided that if they wanted to track every move of every person, it was going to cost them. Using commonly available parts, James built a personal EMP device. Its range was dependent on the size of the power supply he tied to it, but when used properly, it would zap anything with a circuit within several feet of him. The Body Scanners were useless. RFID tags went blank. CCTV cameras shorted. They would eventually be replaced, but the cost would be high, and as long as he didn't get caught, James could experience, at least for a short time, the America of the past…

Sound Cannon / Silence Gun
Mary had seen her family in poverty, her country in ruins, and her government turn to outright treason. In her mind, the only recourse left was to take to the streets. However, this proved to be almost as useless as participating in the election process. New sound cannon vehicles were deployed in waves along with riot police to quell any and all protests, no matter how peaceful in nature. Mary learned two things quickly. The first: always bring a gas mask to the party. The second: always think simple when faced with technological tyranny. The sound cannon blast was terrible, making concentration difficult and causing panic amongst the protestors. Even worse though was the Silence Gun. Which actually recorded and then projected back a person's voice only a split second after they began to talk, causing mental confusion and eventually, frustration and silence. The device was popular at political events where activists were likely to interrupt a candidate's teleprompter speech to expose the public to a few truths. Mary was not a hacker, or a military specialist, or a technician of any kind. So, she wore ear plugs. Problem solved.

5

Night Vision / Thermal Imaging / Predator Drone
A considerable threat to those who decided to fight back against the Swedes was the widespread usage of night vision and thermal imagers by troops sent to hunt down and capture dissenters (the Swedes called them "enemy combatants). The use of FLIR cameras on aircraft and the feared predator drones were especially terrifying to those who knew very little about how such technology actually functions. David, an insurgent against Swede governance, was tired of hearing about how the Predator Drones would be the doom of all who defied the establishment. He felt that this outlandish perception came more from the fact that the drones had no human passenger, and so, no potential casualty risk. The concept of facing down a machine that feels no combat apprehension is certainly disturbing, but not insurmountable. At bottom, what the enemy cannot see, the enemy cannot kill. And so, instead of trying in vain to fight the drones and their thermal / night vision on the terms of the oppressive military presence, he decided to make their vision advantage irrelevant by studying IR evasion used in sniper training. Regular night vision relies, in most cases, on the use of an IR light which bounces off targets within the field of view. This is often referred to as "Active IR". Thermal Vision reads existing IR at a different wavelength, usually in heat producing or high IR producing bodies, called "Passive IR". For evading Active IR night vision, David found that regular camouflaging methods along with smoke worked well. For defeating night vision altogether, he found that bright IR flashlights and floodlights, and even regular bright lights like camera flashes, shined directly at the target wearer of the night vision device, would be blinded for a short period of time, leaving room for escape. Thermal vision evasion was more difficult. David and his team first studied the IR Emissivity Tables of common everyday materials. [And how to check emissivity here.] All objects above the temperature of absolute zero release a certain level of electromagnetic radiation, which thermal imagers pick up and translate into a visual picture. Hiding one's heat signature is difficult, but not impossible. The key, as David learned through military sniper training manuals and combat analysis, was to match his IR signature with that of his surrounding as much as possible. He fashioned a hooded cloak using a material that would block much of his initial warmth, then lined the inside of it with emergency space blanket material, which reflects back around 90% body heat. The cloak design worked well because he could easily take down the hood and unwrap himself when not in immediate danger, allowing the material to cool as he walked. Then David attached local vegetation to the material to help match its IR Emissivity to the surrounding foliage. This combination reduced his thermal signature drastically. Overhead drones could not identify him clearly as a human, if they were able to see him at all. Ground forces were a greater threat, but the element of surprise was still possible for the insurgents with cloaks.

6

In combat, the tandem dangers of drones overhead and ground forces in pursuit with thermal vision made life difficult. David carefully studied field guides to Predator Drone strengths and weaknesses. David and his team then utilized a special strategy under these extreme circumstances called "False IR Signature". Operating in bad weather gave the freedom fighters an instant advantage. Heavy rain washed away thermal footprints and obscured body heat. Thick cloud cover made image integrity poor. Contrary to popular belief, the drones had many downfalls, and their eyes were limited in numerous ways. When in the middle of combat, where drone surveillance was most dangerous to low-tech resistance, multiple fake IR signatures were created using whatever was available. David used a combination of IR Chemlights and hot burning road flares thrown all over the field to misdirect drone cameras. With IR hotspots everywhere, the thermal cameras had no idea where to focus, let alone which targets were real, and which were fake. IR strobe light flares flashed intermittently causing even more confusion, and masked to some extent muzzle flash from firearms. Larger objects could also be faked using pieces of metal heated with fire, or even heated metallic balloons arranged in a sizable pattern to mimic a hot running car or tank. Drones would zero in on false targets and unleash missiles, only to waste the expensive ordinance on party favors and scrap. Through David's knowledge and efforts, the game had become more level.

Technology Or Force Of Will?
Technological weaponry and surveillance should never be underestimated. Today's advancements are terrifying, devastating, and were designed after decades of trial and error in peripheral wars and burgeoning dictatorships around the world. A technology cannot be defeated by someone who does not respect its capability. That said, in the end, wars are not won with fancy gadgets alone. All conflicts are decided by a primary driver; force of will. Who has the strength of spirit to endure the longest? Who has the intelligence to outwit the technology? Who knows exactly what they are fighting for and why? These questions decide victory, not unmanned aircraft and computers. In the introduction, I joke a little about the state of our Republic, but sadly, the fictional accounts above represent realities that Americans today must consider as practical and possible in the near future. "The Swedes" are not illusion, but a parable of the kind of totalitarianism that arises in the midst of any culture dominated by elitism and collectivism. Whether you believe this is realistic or not in our nation today I suppose is dependent on your level of awareness surrounding current events. My goal in covering the information above is not to convince you one way or the other of the dangers ahead. The point is to redistribute the knowledge so that one day, in the event that the stories portrayed turn out to be more true than you realize, you may have the ability to do something about those troubled times as an effective champion, rather than a helpless victim…

7

USA Freedom Fighter

Any Questions?

Operational Plan in Place

8

The Police State Is Here
“There are those who still think they are holding the pass against a revolution that may be coming up the road. But they are gazing in the wrong direction. The revolution is behind them. It went by in the Night of Depression, singing songs to freedom." Those are the words of Garet Garrett, the 20th-century journalist and writer, who lamented the collapse of the old Republic and the rise of the American managerial/administrative state the consummation of which he had witnessed in Franklin D. Roosevelt's New Deal. Garrett's observation came to mind the other day as I was contemplating the current state of civil liberties and privacy in 21st-century America. Could it be that rather than fending off the possibility of a police state arising in the future, we are already confronted with the grim reality of one in the present? The country's degeneration into a police state has been observable for decades, but it accelerated after 9/11 when the George W. Bush administration exploited the crisis atmosphere to ram through a series of unconstitutional and tyrannical measures. Fear became the coin of the realm as the American people traded away their liberties for the empty promise of security. That such a deal would turn sour was foreseeable. Benjamin Franklin told his fellow countrymen 250 years ago, "Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety." His admonition, of course, hasn't always been heeded. The country's history is replete with examples of the American people succumbing to paroxysms of fear and hysteria, often resulting in gross violations of civil liberties. But these episodes, however terrible, were shortlived because they were reactions to temporary crises. Today Americans are confronted with something entirely different we are told this crisis is permanent. The federal government now boasts 16 national intelligence agencies, spending an estimated $100 billion per year and employing an army of staffers and contractors who routinely (and illegally) spy domestically. Investigative journalist James Bamford recently wrote in Wired that the National Security Agency is putting finishing touches on a massive data storage center in Utah as part of its "Stellar Wind" program, a massive surveillance and data-mining operation that involves collecting, storing, and examining billions of domestic phone calls and email messages. This project is a culmination of a decade-long effort by the nation's spy agencies to create a panoptic society, in which the entire population is brought under round-the-clock government surveillance. This is no longer the stuff of dystopian futuristic novels and is now a grim reality, largely because of the stupendous increases in computing power and storage capacity achieved in recent years. "Total information awareness" is now feasible thanks to the geniuses in Silicon Valley and it is now considered permissible by the psychopaths and control freaks running the national-security state. John Whitehead of the Rutherford Institute provided an excellent summation of the problem in a piece he wrote late last year:

9

The U.S. government now has at its disposal a technological arsenal so sophisticated and invasive as to render any constitutional protections null and void. And these technologies are being used by the government to invade the privacy of the American people. Several years ago, government officials acknowledged that the nefarious intelligence gathering entity known as the National Security Agency (NSA) had exceeded its legal authority by eavesdropping on Americans' private email messages and phone calls. However, these reports barely scratch the surface of what we are coming to recognize as a "security/industrial complex" a marriage of government, military and corporate interests aimed at keeping Americans under constant surveillance. The increasingly complex security needs of our massive federal government, especially in the areas of defense, surveillance and data management, have been met within the corporate sector, which has shown itself to be a powerful ally that both depends on and feeds the growth of governmental bureaucracy. The Department of Homeland Security (DHS) recently made headlines when it purchased 450 million rounds of .40-caliber ammunition. Why is DHS hoarding that much ammo? What kind of trouble is it expecting? The Transportation Security Agency has extended its jurisdiction beyond airports and now is groping and irradiating Americans at train stations, bus depots, and the nation's highways. So-called fusion centers have popped up in 49 states, amassing files on ordinary Americans for doing the most ordinary of things. State and local police departments have been gradually assimilated into what journalist William Norman Grigg calls the "vertically integrated Homeland Security State." This integration has largely been a function of the federal government's so-called wars on drugs and terrorism. In this process, police departments have been transmogrified into virtual standing armies, endowed with an array of military-grade weapons and equipment. SWAT teams, once a rarity, have proliferated throughout the country and are increasingly used in routine police work. And this militarization of the police has been coupled with the use of actual military personnel domestically. The emergence of the police state has predictably resulted in the swelling of the nation's prison population, which is now the largest in the world. Police are now jailing people for the "crimes" of selling raw milk or buying too much Sudafed. A massive snarl of regulatory red tape dangles above the head of every American, threatening to impose crushing fines and even imprisonment. As former assistant Treasury Secretary Paul Craig Roberts says, "Long before 9/11, U.S. law had ceased to be a shield of the people and had been turned into a weapon in the hands of the government." The nation's courts, rather than checking the police state's relentless expansion, have become its enabler. The Indiana Supreme Court ruled in Barnes v. State that citizens do not have the right to resist police officers who enter their homes illegally. The U.S. Supreme Court delivered a severe blow to the Fourth Amendment when it ruled in Kentucky v. King that police could break into a home without a warrant so long as they suspected that those inside were in possession of illegal drugs. And just a few weeks ago, the court ruled that law-enforcement officials, whether local, state, or federal, have the authority to strip-search anyone they arrest for any reason.

10

What recourse do the people have when police forces violate the very law they are sworn to uphold and the courts become complicit in their abuse? As disturbing as that question is, it is one that American people must ask themselves if the country's descent into tyranny is to be arrested. The recently passed Federal Aviation Administration Air Transportation Modernization and Safety Act includes an amendment authorizing the use of spy drones in American airspace. The bill's passage was apparently anticipated by law-enforcement agencies across the nation, as many of them had already deployed spy drones as part of their domestic police work. U.S. Customs and Border Protection, the FBI, and the DEA are also using spy drones in their operations. The Patriot Act, the Military Commissions Act, the Protect America Act, and the more recent National Defense Authorization Act of 2012 (NDAA) are all grossly unconstitutional, yet they passed through Congress with overwhelming bipartisan support. The NDAA is particularly egregious, for it not only explicitly authorizes indefinite detentions of U.S. citizens on American soil but also requires that detainees be held in military custody. The Federal Restricted Buildings and Grounds Improvement Act codifies the federal government's practice of intimidating and silencing protestors. The ostensible purpose of the law is to prevent the unlawful disruption of government business or "official functions," but what is "unlawful" is left to the discretion of federal agents. Indeed, the language of the law is so vague that it arguably constitutes a suspension of the First Amendment right to free speech and peaceful assembly. The intent of this short essay is not to provide a "list of horribles" committed by the government (although such an accounting is useful) but to point out that the much-feared police state has come into being. Its growth had been gradual, which contributed to the public's indifference, but it metastasized after 9/11, when the remaining legal barriers to the state's expansion were taken down in the name of "national security." A large portion of the public appears to be appropriately alarmed, but it remains to be seen whether this will reach a critical mass in time to reverse the country's destructive course.

11

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close