Sunday, December 11, 2016

VERUS Phone Sale

I had several requests to do a sale on the phone as well, so here ya go...

$ 50 bucks off next five Verus phone orders until Christmas.

Friday, December 9, 2016

Laptop Holiday Sale


I have one compact SEPIO laptop left in stock and ready to ship in time for Christmas. I am also going to knock $100 bucks off the price of the next five laptops sold. 

Offer expires on December 17th.

*** EDIT: I also have a small number of 15 inch SEPIOs with the Ultra High Definition/4K screens if anyone is interested. *** 


Info on the SEPIO Operating System

I have received a lot of questions regarding the SEPIO laptop and operating system, which run from "how is this system more secure than any other linux system?" to "what the heck is the SEPIO OS?"

So let me try to answer some of the questions...

First off my mission goals with this system:

To create an easy to use yet extremely secure OS that anyone can easily migrate to from Windows or Mac. The defensive measures of the system should require little to no user intervention in order to keep the system safe from outside attack. The applications should cover all the users basic needs (video, music, editing, email, browsing, messaging, documents, etc) without having to search for extra software. It must have a full suite of security tools such as encryption software, crypto-currency wallets and tools, TOR/I2P/VPN access, peer 2 peer secure messaging.

We use the model of   Anonymity + Security = Privacy  and personal privacy is a cornerstone of individual liberty.

Now the questions:

1) What makes this more secure than any other linux distribution?

    To start with, Linux is open source (no hidden code), which lends itself to security as it is auditable and transparent. Linux also has some powerful security abilities baked into the kernel although they are often not utilized by most distros. I compile my own kernel with Grsecurity and PaX patches. What is Grsecurity? From their website -

"Grsecurity® is an extensive security enhancement to the Linux kernel that defends against a wide range of security threats through intelligent access control, memory corruption-based exploit prevention, and a host of other system hardening that generally require no configuration. It has been actively developed and maintained for the past 15 years."

"Only grsecurity provides protection against zero-day and other advanced threats that buys administrators valuable time while vulnerability fixes make their way out to distributions and production testing. This is made possible by our focus on eliminating entire bug classes and exploit vectors, rather than the status-quo elimination of individual vulnerabilities."

"Grsecurity has been developed and maintained since 2001, from the very first 2.4 Linux kernel to the latest and greatest 4.x. In addition to tracking the latest stable kernel, we provide stable releases for both the 3.14 and 4.4 kernels with additional security backports.
We stay on top of -- and in many cases drive -- the state of the art in security research. While the security teams of Linux distributions react to the latest widespread exploit simply by fixing the associated vulnerability, we quickly work in addition to close down any new exploit vectors, reduce the chance of similar vulnerabilities, and insert additional roadblocks for ancillary techniques that made the exploit possible or reliable.
As a result of this extensive approach, it is not uncommon to find in the event of a published exploit, particularly against the kernel, that the exploit's success is prevented by several separate features of grsecurity."

I write custom firewall rules that guard against outside intrusion tactics. I lockdown traditional attack vectors like SSH, Telnet, Ping. I block IPv6 traffic as it can lead to potential VPN leaks.

I employ restrictive sandboxing on any web facing applications as well as many other commonly used apps. This applies another layer of protection if an application becomes compromised by keeping it containerized.

On demand ant-virus scanning is built in as well as rootkit and trojan scanning.

I provide pre-configured virtual router and virtual workstations, for isolated and anonymous TOR browsing with randomized MAC addresses and spoofed IPs.

Common exploit avenues such as single-user login, BIOS attacks and bootloader exploits are blocked. Bootloader is password protected and password is stored hashed.

Full disk encryption (including swap)with strong AES-256-XTS as well as secondary encryption of user folders and tertiary encryption available as needed.

Secure delete function (DoD and Gutman standards).

Browser and Email client are extremely hardened against attacks and data leaking.

Approved VPN clients are built in as well as a preconfigured free VPN option.

Non-logging DNSsec DNS servers are enforced as opposed to the standard "google" DNS which log every search you make and store it indefinitely.

Security updates are delivered as soon as they are released from the Debian/Ubuntu/Mint teams.

I could go on, but that covers the primary security differences between SEPIO and something like Ubuntu, Fedora or Suse....not to mention the massive security chasm between SEPIO and Windows/Mac.

2) What is SEPIO OS?

    Well, besides what was already answered above, SEPIO is a security focused distro built on top of Linux Mint. It uses a customized version of the Cinnamon desktop environment. It is a pleasant and easy to use desktop with support for just about every type of video and music format, as well as full photo and document support. You can plug in your email accounts and be off and running in no time. You can easily and safely visit all your favorite websites without fear of compromise. You can enjoy your digital life without the spying and intervention of big corporations, hackers and governments gone crazy.

3) Can I just get the SEPIO OS and install it on my own laptop?

    At present, no. Besides installing the system I have to do a great deal of custom configuration and hardware setup on each build. This would prove a daunting if not frustrating task for even a competent linux enthusiast.

Friday, November 11, 2016

*New Courses Added*

Home Defense Solutions / CQB course added to courses page. Email me to reserve class dates.

Sunday, November 6, 2016

Vehicle Movements in Non-Permissive Environs - PART 2

Low profile

Method of Movement

Due to the fact that it is very difficult for a solitary vehicle to defend itself effectively we will create an SOP that all movements will consist of two vehicles, a lead/primary and a follow/secondary. The primary is tasked with accomplishing the "mission" (picking up a local supporter, etc) while the follow vehicle follows at a safe distance (will vary depending on road/traffic conditions) and provides overwatch.

As an example, lets say that your primary vic (vehicle) is heading down a lightly traveled rural highway with follow vic a quarter mile or so behind. On long straight stretches of highway, follow vic would drift back and increase distance, keeping primary in sight. If the road gets congested or starts winding around, follow would close the distance as needed. The goal here is to keep primary in sight (as well as maintaining comms - we will cover that later) without giving away the fact that you are supporting the primary. You also want to stay within the range capability of your weapon systems (not to mention the operator's expertise level).

Lets say that primary vic is stopped by a local gang's roadblock or perhaps a rouge government agent executes a "pull-over". Follow vic would make comms with primary so as to keep an ear on what was happening and either pull over and prepare to support by fire, or rapidly make approach as the situation dictates. Ideally you would have a minimum of two people in each vehicle. The driver focuses on driving and the passenger/TC deals with operations.

This order of movement can also be reversed with the primary in the rear if you have a high-value person or item inside the primary. The lead vehicle would act as a probe or pointman, keeping the primary vic buffered as needed.

Once primary reaches it's target it will notify home/base (using brevity codes unless you are lucky enough to have secure comms). Follow vehicle will park in overwatch or "satellite" the area, depending on the situation. A third vehicle with your QRF (quick reaction force) would be on standby at your home/base for the duration of the mission. In the event that the primary/follow teams need support or rescue the QRF team would launch. The QRF should have your largest vehicle and should be heavily armed. The QRF may need to fill multiple roles including that of ambulance and should have the necessary medical support equipment on board.

Equipping the Rig

We are assuming that you will have only soft-skin (non-armored) vehicles at your disposal as armored vehicles in the US are a rather expensive affair, both in initial cost and upkeep. With that in mind, remember that lacking armor - speed (or mobility) equals security.

This is a basic list for what we would keep in our rigs while operating in said environment:

- Fire extinguisher
- Fix-a-flat and puncture kit (x4)
- Spare tire w/tools
- 110ac power inverter
- binoculars
- seatbelt cutter/window breaker tool
- case of drinking water
- spare magazines for rifles/pistols
- weapons maintenance kit
- basic toolbox
- large bolt cutters
- tow strap/snap-strap
- medical bag
- VS-17 panel (you can make your own if needed)
- IR/WL strobe
- box of caltrops
- smoke grenades (HC and colored)
- road flares
- aerial flare
- spare batteries (for radios, GPS, flashlights, NVGs, etc)
- Jump pack w/air compressor
- compass
- GPS unit
- Radio (GMRS/CB/HAM whatever your unit is using)
- Scanner/Bearcat
- solar charger (for 12v system)
- shovel/pick/e-tool
- poncho liner (especially if in a cold climate)
- lighters/matches
- spare engine fluids
- come-along (if vic does not have a winch)
- gas can
- roll of dark fabric screen or mesh and clothespins
- windshield blocker/dash saver
- Optional - camo netting large enough to cover rig if you need to cache
- and of course, duck tape and 550 cord
Useful but overt bag - consider civilian bag with internal pouches
You can tailor this to fit your needs, but this will give you the basic necessities to keep the vehicle rolling in a bad situation. All "tactical" items such as magazines and long guns should be out of sight to someone walking around the outside of the vehicle. It goes without saying that tinted windows are a huge plus.

Keep in mind this list is separate from your personal go-bag, which may contain some of these items as well.


Next article will cover dressing for success.

- Dressing around your equipment
- Low profile fundamentals/establishing baseline
- Long gun storage and deployment
- Body Armor

Soft skin vehicle aftermath - bad day for them

Saturday, November 5, 2016

Vehicle Movements in Non-Permissive Environs - PART 1

There could shortly come a time when a mundane task such as driving into town to pick up a family member could become a seriously dangerous activity. Some of us are used to this concept as we performed it routinely overseas as part of a military unit or a clandestine services unit.
The military unit will for the most part roll out in a heavy or overt-profile; meaning part of the psychological strategy is visibly projecting force....the "you don't want none of this" approach. This approach may work depending on the METT-TC or environmental/situational reality. As many a soldier has learned, in a warzone, this can make you a rather juicy target. This could also be applied to a domestic "grid-down/WROL/SHTF" scenario.  The clandestine operator will generally follow a policy of low-profile (or no-profile), meaning they seek to blend into the local environment as neatly as possible. This is for a couple of reasons, most of which should be obvious but lets examine a few.
Decidedly overt ODA gun truck

1. Unlike a military unit with air assets and support forces, the ClanOps generally have very limited, if any support (usually limited to other members of their homogeneous unit).

2. It is usually imperative to the successful outcome of their operation that they draw little if any attention to themselves.

3. A military vehicle patrol/convoy/truck team can have anywhere from 12 men to company strength, while the ClanOps will generally have 2 to 5 men.

4. Military units will move in armored vehicles whenever possible (almost exclusively anymore), while a low-profile armored vehicle may not be available for the ClanOps or fit within the mission parameters.

Where am I going with all this?

The ClanOps model is a logical model for the aforementioned SHTF scenarios we may face domestically. Most of us are going to be limited in manpower to our family/friends or neighborhood defense team members. We want to avoid drawing attention and avoid getting into pitched battles as much as possible. Where as before we could simply jump in the car and head into town for groceries, in this scenario we will need to start each movement with a plan and movement brief.

Your planning area should include large and small scale maps of your AO (area of operations) and extra maps for extended movements out of area. Ideally your maps would have overlays that indicate the following:

1. Heavy traffic areas
2. Dead ends and choke points (avoidance of likely ambush points)
3. Government/Military facilities
4. Traffic cameras
5. Medical facilities (hospitals, pharmacies, veterinary clinics)
6. Fuel points (public, government, commercial)
7. Resupply areas (stores, caches)
8. Known trouble areas (to be updated daily)
9. Lay-up points / safe-houses

It should also include a radio scanner tuned to all local emergency frequencies, base station units for your particular radio system, cell phones, computers with area webcam feeds/traffic cams and any other comms items you deem necessary.

As part of your pre-movement brief you would draw your primary route, as well as secondary and tertiary routes. You would also label your phase lines or check points as well as your timelines for departure/arrival/return. This gives your backup team/QRF a better idea of where to find you if lines of communication break down.

In the follow-on articles we will discuss:

- Equipping the vehicles
- Maintenance tasks
- Emergency action plans
- Communications
- Personal gear/weapons configurations for low-profile
- Quick Reaction Force duties

Configuring locally sourced vehicles to meet the mission

Monday, October 3, 2016

SEPIO Laptop Details

As many of you know, I have been working on a secure laptop project for the last three years. As all of us increasingly rely on our personal computers for everything from shopping to communication to news and information, it became clear to me that there needed to be a safer option than Windows and Mac, yet still be simple and easy to use. I give you the first version of the SEPIO privacy conscious computer.

Currently I am offering it in 15.6 inch and 13.3 inch versions. The hardware may vary slightly due to availability, but will all be of comparable speed and quality.

Current specs on both models:

- i5-6200U CPU (or comparable AMD cpu)
- 500GB hard drive
- 1920x1080 screen (15.6" model), 1366x768 (13.3" model)
- Touchscreen

The RAM can be upgraded to 16GB on request and the HD can be upgraded to a fast 1TB 7200rpm or SSD as well.

The operating system:

- SEPIO OS with Grsecurity/Pax hardened kernel
- Locked BIOS, hard drive and bootloader
- Full disk encryption with AES-256-XTS
- Sandboxing of programs
- Custom firewall
- Built in VPN, TOR, Zeronet and I2P
- Virtual TOR router and workstation
- Software defined radio suite
- Hardened browser and mail client
- Extensive security tools suite
- Crypto wallets (Cloakcoin, Bitcoin, Dashpay, Ethereum, Shadowcash)
- and much more...

Essentially, this is the computer I wanted for myself.

It comes with an RF blocking travel case and cover for the webcam.

Until I get the store page updated, you may order simply by emailing me with your desired model and any customizations you want.

Cost is $950 and $35 for shipping (ask if you need special shipping).
Like my other devices, it is shipped in a locked state and sealed in tamper evident RF blocking container.

Saturday, September 3, 2016

UPDATES - Secure Phone, GroundRod 2, Secure Laptop

So, I have been busy the last several weeks. Here is what's coming up.....

1. The GroundRod Primer in Central Washington State is a go for 17-18 SEP. This will probably be the last Primer before GroundRod 2 starts up. Email if you want to secure a seat.

2. My secure phone project is done (finally). The VERUS 1 is a privacy conscious phone with state of the art hardware. It sports a 6 inch HD screen, quad-core processor and 3GB of system RAM. The VERUS OS is built on AOSP and CM with anything Google removed from the system. It features a lot of the security tools that the LIBERTAS tablet had, plus some new goodies. I will get full specs and pictures posted shortly.

3. I am wrapping up the secure laptop project right now. The first SEPIO laptop run will feature a high end AMD CPU, 16GB RAM, HD screen and 1TB hard drive. The SEPIO OS is a hardened system based on Linux. It provides maximum physical and web facing security as well as an extensive suite of cryptography tools and secure communication options. Despite all this I have managed to keep the system simple and easy to use for people new to linux based systems. You can watch movies, play music and surf the web via TOR/I2P/VPN on a hardened and sandboxed browser. There is nothing on the market right now that even attempts to come close to this level of security.


I am sure everyone has heard by now that the US government is about to turn the control of the internet over to the UN/ global entities. We saw this coming a long time ago which is why I have been pushing so hard on this subject the last couple years. You need to learn and practice these skills while you still have a chance. Make no mistake, they aim to seriously clamp down on internet free speech.

Saturday, August 6, 2016

Wyoming GroundRod

If we can get a few more interested parties, I can schedule a Wyoming course for this month.

Let me know...

Saturday, July 30, 2016

More GroundRod

Upcoming GroundRod Primer in central Washington State, September 17-18.

I have available class dates for the month of August if there are enough interested parties. I have requests for Wyoming, Florida, Oregon and Ohio, but do not have the minimum student requirements as of yet.

GroundRod 2 is almost ready to go. So get ready......

Thursday, June 30, 2016

Internet Regulation Coming

This has been in the works for a while and looks to be bearing down on us all very shortly.

Regulation of internet

Learn the skills needed to navigate the web despite government's efforts to lock it down and stifle free speech. will only get worse....

Thursday, June 23, 2016

GroundRod Primer - California

When: 9-10 July

Where: Sacramento Area

Cost: $350 ( You can send your $100 deposit to secure your seat on the Store page)

Bring: Laptop, 3 USB flash drives (4-8GB), note taking material.

Wednesday, June 22, 2016

They Will Not Stop

Senate Falls 1 Vote Short of Giving FBI Access to Browser Histories Without Court Order

Internet Provider Gagged for Decade Reveals What FBI Wanted Without Warrant

China Cyber Attacks on U.S. Targets

Proposed legislative changes that will increase law enforcement’s ability to hack into computers


Learn the skills to defend yourself now, before it gets worse......because it will.

Tuesday, June 21, 2016

California Class

I am looking to schedule a GroundRod Primer course for the Northern/Central California area in the next 2-3 weeks. If you are interested email me directly as I am still working on a host.

Friday, June 17, 2016

Student Course Reviews from Texas, Georgia & Arizona Classes

Some recent reviews from students on the GroundRod Primer course...


I've been waiting since June 2013, and the initial Edward Snowden revelations of massive unconstitutional surveillance, for this class. I found GroundRod Primer to be an absolutely essential course for American citizens that want to regain privacy in their digital communications. After completing this class, and implementing even some of the recommendations, you will once again be able to express yourself freely via digital comms without the self-censorship that has become increasingly prevalent with the knowledge of illegal government spying. That is a GREAT feeling.

K covered the various types of encryption and the context in which each was most useful. Discussions on the best VPN providers (and why), email providers, passwords and passphrases were very useful. The discussion of crypto-currency was very interesting. K clarified how to best get started with Bitcoin and start using a payment method that cannot be tracked, just like cash in the physical world. Crypto-currency holds much promise in the event of a dollar collapse or bank failure.

The usability of Linux and secure comm tools have dramatically increased since 2014 (kudos to all the open source developers!). K did a great job of walking us through these tools on laptops booted from a USB drive provided for class exercises. The pros and cons of each were discussed so you had a clear idea of the best context in which to use a tool. The class had a good combination of lecture and exercise. While we covered a lot of material I did not feel rushed. This was a class with substance and immediate practical application.

Make the commitment now to attend a GroundRod Primer class in your area. You will not regret it.

OpSec Grandpa


Ground Rod Primer Part I
Phoenix, Arizona June 11 & 12

Why you want this class:
You are an American citizen
You want to protect your assets and rights.
You are a Windows (or Mac) user.
You are Linux user but don't use encryption

Don't take the class if you already work for IRS, FBI or NSA, it'll only make you better.

K, the instructor uses these methods and tools as a professional. Imagine Richard Petty giving defensive driving classes.

The class consists of two eight-hour days, with generous breaks. K takes questions throughout the day. The sessions are conducted in a "lab" format. A concept or topic is presented and software solutions are explained, then students use the software tools. K provides individual coaching to make sure you've grasped the idea. In our class he provided laptops when student's machines stopped working. The instruction is clear, concise but casual. K doesn't talk over you or down to you. You'll get your money's worth.

The class is focused on internet use.
securing your data storage
securing email, file transfer and chat
keeping online traffic private and secure (VPNs)
anonymous web surfing (TOR and Darknet) and commerce (crypto-currency)

The software tools are all Linux-based and available at zero cost. The hard part is knowing which tools to use. K has done the time-consuming work of filtering good from the bad and mediocre. His classroom operating system is pre-loaded and configured on a usb drive, your machine is unchanged. Your outlook will be changed.

Good encryption, properly applied works. K shows how good tools make the job easy. Your part is changing habits and incorporating the tools.

God bless our work,



I recently took the GroundRod Primer course from Combat Studies Group and enjoyed it immensely. I am an Info Security professional with 20+ years of experience in securing corporate networks. The class covers the basics very well and even a experienced guy like me learned a few new things. The class also does a great job teaching a tough, very technical, subject to folks that may only have basic computer skills. In summary, whether you're a seasoned info sec professional or someone just learning computers, you will enjoy this class and learn how to better your personal security.



Thanks for sharing your thoughts on the class guys!

Tuesday, June 7, 2016

A re-post for those that missed it...

Brisco strained against his leather collar, seemingly eager to leave the immediate area. Eva's 70 year old fingers snapped back on the disgruntled terrier's leash, but she could certainly understand his unease. Even though the neighborhood “safety checkpoints” had been a part of their daily life for the better part of the year, she never could resolve herself to see them as anything other than a 21st century re-envisioning of cold war east Germany. The pat downs, the scanning and downloading of her cell phone, the x-ray and search of her belongings just to get from one part of town to the other. Of course it was all necessary because of all the “terrorist activity” in the area; or so she was told.

Once inside her apartment, she began what had become a twice a week operation...removing Brisco's ornate leather collar...pulling back the stitching....retrieving the microSD card hidden between the leather laminate and beneath one of the several steel sequins that decorated his collar. She noted the small red sticker attached to the tiny device, indicating that it was a time sensitive message and needed to be passed as soon as possible. She plugged her “special” thumb-drive into her old laptop and turned it on. The system recognized the bootable operating system on the thumb drive and the hardened OS came to life. She entered her passwords and inserted the microSD card. She opened the Truecrypt volume that resided on the micro and observed one file entitled “r6K?q@71”, this meant nothing to her, not that it should have.....while she and several other groups had the monthly passphrase to open the disk itself, the file inside could only be opened by the intended recipient. She typed up her short courier report, which was basically her version of a succinct SALUTE report for the last few days, encrypted it with her PGP key and inserted it into the Truecrypt volume of the micro. She returned the micro to it's furry courier and pulled the thumb-drive from the laptop, causing the computer to scrub it's memory before shutting down.

Eva gathered her things, and with Brisco in tow, headed towards the door, pausing for a moment to look at a picture on the wall. She needed courage right now and looking at the white haired man in the picture that she had shared her life with..... until agents of the regime took him away forever ….refueled her cause and steadied her nerves. Brisco broke her from her thoughts with a muffled woof,  as if reminding her of the time sensitive nature of their mission.
As she and her cohort headed to their dog park rendezvous, she let a half smile show.....lives depended on her, she mattered! – perhaps now more than ever...

This serves as an example for the ongoing COMSEC series. More to follow.......

** Note: Truecrypt is now Veracrypt **

VPN Promo

As many of you know, AirVPN is one of my recommended VPN providers. They are currently having an anniversary promotion until June 12 of 25% off any VPN plan. I encourage everyone to check it out  AirVPN SALE  , they also accept over 15 different crypto-currencies.

And remember...

1) When you connect to purchase a plan, do so via TOR, another VPN or an anonymous computer away from your home internet.

2) Pay with Bitcoin (properly mixed) or other crypto-currency. All that security/anonymity is ruined when you pay with your easily tracked Visa/MC/Bank account.

3) If they want a contact email address, use a seperate anonymous one that you use for nothing else, or better yet, a throw-away one from Yopmail, Guerrilla Mail, etc.

4) Have more than one VPN provider at your disposal.

5) And for the love of ******, use a strong 20 character password or passphrase.


It's "Brave New 1984" folks...............behave accordingly.

Sunday, May 29, 2016

Updates for GroundRod

There are still some seats left for the Atlanta GroundRod class for this coming weekend and also for the Phoenix class for 11-12 June. I am looking at the following areas for classes this summer -

- California

- Wyoming

- Ohio

- Florida

- Utah

Email me if you have any interest in attending in one of those areas or are interested in hosting.


GroundRod 2 is coming soon. It will build on the fundamentals learned in GroundRod Primer and will cover the following subjects -

- I2P darknet usage

- Alternatives to traditional email services

- Using Crypto-currency anonymously

- Dealing with Stingray/IMSI catchers and phone exploitation

- Applying tradecraft techniques in the real world

- Practicing the skills out in the field with active adversaries

and more.

Friday, May 20, 2016

GroundRod Oregon May 28-29

Since the Arizona class was rescheduled, I will be available to do a GroundRod Primer course in Oregon if there are any interested parties in the area.

Contact me HERE if you wish to attend.


GroundRod 2 will be starting up shortly, so get in on the training while you can.

Thursday, May 19, 2016

Email Update

I have uppdated my PGP public key and my Bitmessage info on the "Public Key & Bitmessage" page.

GroundRod Arizona reschedule

Since the GroundRod Phoenix class was scheduled for Memorial day weekend, and at the request of many of the students, we are rescheduling the Phoenix class for June 11-12.

Class fee is $350 ($300 if we go beyond 10 students). You can reserve your seat by making the $100 class deposit on the Store page (options are available if you do not wish to use Paypal, just email me).

Need to bring:

- Laptop

- 3 USB thumb drives (4-8 GB in capacity)

- Note taking materials

- extra extension cord (optional)

Thursday, May 12, 2016

Interview Podcast

For those that missed the live broadcast interview, here is a podcast link.

** Here is a direct link if the player gives you any problems -

CSG Interview

Wednesday, May 11, 2016

Texas is a go

Okay folks, we still have a lot of seats available but we are going to go ahead and make the Texas class happen.

Shoot me an email (CSG email ) if you want to grab a seat. Last minute students can just bring cash. ($350)

Class will be held in Irving, just north of the DFW airport. I will give exact location once you reach out to me via email.

Students need to bring:

1) Laptop

2) Three USB thumb drives (4-8 GB in capacity)

3) Note taking material

4) There should be places for meals nearby

See you there!

Monday, May 9, 2016

Radio Interview

For anyone interested, I will be interviewed live tomorrow by JJS from Radio Free Redoubt on the Matt Shea show. Listening links and radio stations are linked below.

ACN Network

Station List

Show will be from 4pm PST to 5pm PST and will cover topics ranging from current privacy concerns and securing your life to what the future may hold for all of us liberty lovers.

Wednesday, May 4, 2016

Aircraft Tracking in Libertas

Libertas secure tablets are now shipping with Avare ADS-B software installed. This allows you to track aircraft in your AO in real time. You just need to plug in a RTL-SDR USB attachment with the included adapter and you are in business.

Current Libertas owners can install the app from the CSG store in Aptoide.

Note* The map function will not work as it relies on Google maps (Libertas blocks all Google framework), however it does provide the data readout which is what matters in this case.

Tuesday, May 3, 2016

GroundRod Texas ***Updated***

*** Class is a go. Host can be reached at Host , or you can email me at CSG to secure your seat. Once you are confirmed I will forward instructions for the class link up. It will be held in the vicinity of the DFW airport.

I have had several inquires into the GroundRod Primer course scheduled for May 14-15, but I have not had anyone step up to host it yet. I need to hear from the prospective students this week if this is going to happen. If we cannot hit the 10 student minimum, I am willing to do a 6 student minimum at $350 a head (the price will return to $300 if we hit the 10 student minimum).

I will be deploying again soon, so time is running out to make these courses happen. Email me here CSG to reserve a seat or to offer to host.

libertatem requirit nisu

Saturday, April 30, 2016

GroundRod Primer Review from Pennsylvania

The host of the recent PA GroundRod course, IDPA Grandmaster Jack Weigand of Weigand Combat Handguns Inc, was kind enough to send in a review for me to share with the readers...


GroundRod Primer Course Review

Please understand this review is being written by a non computer guy. I
see computers as a tool and the less complicated the better. I need to
be spoon fed information and repetition is required. In this class I got
what I needed.

It is a two day course of non stop input, not rushed but ongoing. K did
a great job in not let anyone get behind. He patiently answered
questions and jumped in and helped when necessary. There was the full
spectrum of students from casual computer user to some fairly high speed
dudes in the class. I can safely say no one was bored.

The course started out with an explanation of what the threats are,
defensive measures and physical counter measures. It was nice to have
all of that in a nutshell. It was an eye opener to me, I knew some of
the threats but not all of the threats we were introduced to.

A great explanation of what operating system to use and why. This was
worth the price of admission. As a non techie guy, Linux was a known
entity but I didn't know much about it. I am now in the process of
changing over to it.

A fantastic explanation of open source software proceeded, I finally
understand why that it is so important to use open source products.

Then we proceeded into various pieces of software. Each was explained in
detail, what it did, why we needed it and how to use it. Disc
overwriting software, encryption software, Keyfiles, passwords and keys,
wireless security, Internet protocols and such. We delved into VPN
(virtual personal networks) which was of great interest to me. I am
already running one. We went over the “Dark Net” and that could have
been a day long study on its own. Tor was a good deal of time in the
class and for good reason. Meta data was a interesting study and how it
is used against you. Web browsers were discussed the pros and cons of
many of the popular offerings.

Email was of course a popular topic and the inherent risks of using
that. Encrypted chat was discussed, setup and used. Constructing,
managing and storing passwords and the software to do all of that was
setup and used. Steganography was discussed and demonstrated, awesome
field of study.

We ran Tails and rummaged through a lot of modification, setup and
running that. I have that running since the class.

Last but not least, Bitcoin was discussed and demonstrated in great
detail. I was completely enthralled with that topic and am starting to
use that also.

All in all you are given a fantastic overview and taste for computer
security and how to establish pretty secure communications using your
computer. I believe I have 20 pages of notes and suggestions for study
in my notebook for further implementation and use.

If you are not sure the course is worth the time and money it will
consume I believe I can say from my vantage point it was worth that and
much more. I told K to sign me up for the followup course to this one.
Hopefully I will have this one digested by then.

Jack Weigand

Wednesday, April 20, 2016

GroundRod - Arizona (***Updated***)

I have a GroundRod Primer course penciled in for 28-29 May in Phoenix.

Host can be reached at

Register with me or via the host.

Cost: $300

Need to bring: Laptop, 3 USB drives, note taking material.

Tuesday, April 19, 2016

Training Calendar

Calendar page updated today....


ALSO - Wyoming and Missouri folks that made course requests. I only have a few of you so far, so let me know if you are willing to host (and what area) and I will try to get you a course date.

GroundRod - Georgia

Okay, we have a host and I have penciled in Atlanta for 4-5 June. Host for this event can be reached at, . Reserve your seat via the host and as we get closer I will send out Paypal links. If you don't want to do paypal, let me know and we will work out other arrangements. Also, I still give discounts for Bitcoin payment.


I have had several requests for Texas and Arizona as well.

For Texas, lets aim for 14-15 May in the Dallas/FW area. I just need one of you to volunteer to host.


For Arizona, 21-22 May in Phoenix or Tucson area. Again, just need a host.

For those that host, you get a "free' seat to apply to yourself or a friend in need.

Saturday, April 16, 2016

GroundRod Upcoming Locations

I have had requests for courses in the following locations:





If you are in or near one of these areas and wish to attend an upcoming class, let me know and we will make it happen. The host in each area needs to hit a minimum student threshold before I can commit, so drop a line and let's take back our privacy.

Thursday, April 7, 2016

Class Availability Nationwide

The interest in the GroundRod course has been overwhelming. I have received many inquiries as to when I would be offering the classes in "this state or that state"....Folks, I am willing to travel to nearly anywhere to do the course. All I need is:

1) A point-of-contact / host to organize things locally

2) A classroom / venue (needs to have internet, power, whiteboard, projector screen or wall)

3) At least 10 paying students (travel expenses can get steep)


I have seen a lot of interest in the Georgia/Florida area if anyone wants to put on the "host" hat and make that happen. My weekends are filling up, so let me know as soon as possible.

libertatem requirit nisu

Monday, April 4, 2016

GroundRod Comes to the East Coast

GroundRod Primer course scheduled for 23-24 April in Pennsylvania. Email the host at:  to reserve a seat (or you can email me by clicking the link at the top of the page)

Cost: $300

Need to bring: Laptop, 3 USB thumbdrives (4-8 GB), note taking material.


 GroundRod Primer is designed to address the fundamental concerns of journalists, concerned citizens, activists, whistle blowers, missionaries and liberty lovers in general, with regard to digital security. Whether hackers, governments, criminals or acts of espionage; our privacy is in serious jeopardy.

You will learn to secure your devices and communications in the following ways:

Properly employ symmetric and asymmetric encryption
Create and safely store powerful passwords
Guard against common criminal and state level intrusion techniques
Recognize unsafe software you are using now and explore safe replacements
Surf the web anonymously
Explore the deep web
Transfer files safely
Communicate securely and privately
Understand and deal with malicious firmware

GroundRod Primer is meant to take the uncertainty and guesswork out of digital security, give you a fundamental base of knowledge to grow from and get you up and running with the highest levels of security available TODAY.

Follow on courses will delve deeper into these subjects and address escape and evasion techniques and other tradecraft.

GroundRod Class in Spokane

We had a successful GroundRod Primer course with the Whiterose folks last week and are looking forward to the follow-on classes with them.

One thing that has remained consistent for me over the years, whether teaching CQB, shooting or technical subjects, is the incredible quality of students I see coming through the classes. I see people that are taking ownership of their lives and seeking to better themselves in a world that is struggling to stay free. It is always personally humbling and challenges me to always be improving and deliver the best content I can.

Next class will be held in the Spokane, WA area. Email me or the host at
if you want to reserve a seat.

Wednesday, March 23, 2016

Upcoming Classes

Besides the GroundRod Primer course in Seattle this weekend, I am scheduling another one for the  Spokane area April 9-10 and another on the east coast later in April.

GroundRod is designed to be a series that covers subjects such as:

* Escape & Evasion / Counter Kidnapping
* Tradecraft skills

The courses are composed in such a way as to give the operator a maximum amount of time practicing the skillsets involved.

GroundRod Primer, the first of the series gives the students a solid overview of the information/communication/personal security threats we face and how to effectively mitigate them.

*** Spokane class size is limited, so email me if you plan on attending. Cost is $300 for the weekend.

Tuesday, March 22, 2016

NordVPN update

Just an FYI for the LIBERTAS Tablet users...

The NordVPN app is now available. You can find it in the CSG store in Aptoide on your device.

I have been testing it for the last few days and it is working good and is much easier to setup and use than running NordVPN through the openvpn app.

They have also added more servers, including more VPN-TOR combo servers and Double VPNs.

*** The latest batch of Libertas Tablets have the app installed already ***

Contact Updates

My PGP key and Bitmessage info have been updated.


You can reach me on Tor Messenger at     (Downloads)


Tox ID:  (This would be Qtox on my Sepio OS or Antox app on the Libertas)



Ricochet IM


** As always, keep in mind that nothing you do on Windows or OSX is safe **

Tuesday, March 15, 2016

Intel Training

I had the privilege of attending Sam Culper's SHTF Intelligence course this last weekend in the Pacific Northwest and just wanted to take a moment to thank Sam for a very solid course and make a couple of observations.

People always ask me what they can be doing at this point in the game. I always respond with "training", and not just firearms and tactics training. The understanding and implementation of real-world intelligence skills is arguably every bit as important as the "hard skills" and probably more so for a large segment of the community; in other words, everyone can be playing a part in the "Great Game" (as Kipling put it), but not everyone can be running and gunning, so to speak.

As someone who spent a large portion of their military career engaged in reconnaissance and the "collecting" aspect of intelligence, it was good to spend some time in the S2 (Intel shop) shoes. There is a lot that goes into creating actionable intelligence and Sam's course does an excellent job in covering the necessary skills in a short amount of time.

I would encourage everyone to make the time to attend his course. It will be time well spent.

Monday, February 22, 2016

The War On Encryption

"Over and over again as people keep talking about the Apple / FBI encryption stuff, I keep seeing the same line pop up. It's something along the lines of "but the FBI needs to know what's on that phone, so if Apple can help, why shouldn't it." Let's debunk that myth. The FBI absolutely does not need to know what's on that phone. It might not even care very much about what's on that phone. As the Grugq ably explained last week, there's almost certainly nothing of interest on the phone. As he notes, Farook destroyed his and his wife's personal phones, indicating that if there were anything truly important, he would have destroyed the last phone too. Also:
FBI already has a massive amounts of data, all of which indicates that Farook and Malik were not in contact with a foreign terrorist organisation, nor were they in contact with any other unknown terrorists.

Even if, despite all evidence to the contrary, Farook and Malik were somehow in invisible traceless contact with an ISIS handler, that handler would not have revealed information about other cells, because that would violate the most basic tenet of security — need to know."

" Honestly, the only reason that the FBI wants to force Apple to create the special operating system for this particular phone is the precedent that it can go to court and force a company to build special hacking tools to remove security features from customers. That's a big deal. The information on the phone is almost certainly not a big deal at all."

from Techdirt article


   Folks, as many insiders and whistle-blowers have pointed out in recent years -
properly implemented encryption works. Not using it is a sheer act of foolishness at this point.  
   I get sick of hearing the oft parroted, "the powers that be can break any encryption and nothing is safe". Well, guess we better hang it up then kids, game over. This point of view is nothing more than IPB (intelligence prep of battlefield) in my opinion; get everyone to throw their arms in the air and acquiesce to just operating in the clear all the time. And just like that, they win.
   It is true that there are "broken" encryption standards out there. It's also true that no such agency paid a cool $10 million to RSA Inc to weaken their random number generator a number of years ago (this only affected a specific protocol).
Learn which encryption works and which doesn't. The information is out there.

   The feds are leading the charge to sway public opinion into believing that everything should be "backdoored", for public safety and patriotic duty of course. The number one computer operating system in the world is backdoored already (and has been for some time) and evidence suggests that there are serious holes in number two's OS as well (whether intentional or not remains to be seen). There are solutions to these issues if you are not afraid to roll up your sleeves and get your brain dirty. It's really not all that hard.

   I will be teaching a clinic on the above in March in Washington state, you can go to Groundrod Class
for the details.

....meatspace is great, just not always an option...


  "The real danger is the gradual erosion of individual liberties through automation, integration, and interconnection of many small, separate record-keeping systems, each of which alone may seem innocuous, even benevolent, and wholly justifiable." -Anon., U. S. Privacy Study Commission, 1977

 And from the late Justice Scalia...

"There is nothing new in the realization that the Constitution sometimes insulates the criminality of a few in order to protect the privacy of us all."
Antonin Scalia

Friday, February 12, 2016

** Quick Update **

* New batch of updated Libertas Tablets are coming online now.

* Calendar for upcoming courses has been updated. 

* Have some new course material coming....stuff you will not find available anywhere else.

* Will be migrating away from Blogger platform soon.

* Customized kydex gear coming soon.

* Hardened phone project (VERUS) is nearing completion.

* Hardened laptops (SEPIO) are being finalized right now...hope to have them at the upcoming class in March.

* Hardened router/AP almost done as well.

Stay tuned....Stay free

libertatem requirit nisu

Wednesday, January 27, 2016

Worth Your Time

The following is arguably the clearest and most astute accounting of the recent events in Harney County to date....

Ambush and Murder

....meanwhile the mainstream agitprop channels are working overtime to fashion an "administration approved" narrative. Don't take anything at face value and always consider the source, not to mention their motivations.