Friday, November 3, 2017

Interview with Forward Observer

I recently had a short interview with Forward Observer regarding Bitcoin and Crypto-assets. 

There is a lot of interest being generated right now in this field, and for good reason. Whether your interest lies in protecting your assets, seeking better investment vehicles or just enhancing your privacy; you would be wise to study up on's not going away.

You can listen to it HERE

Wednesday, November 1, 2017


*** SOLD ***

I have a special going right now on a SEPIO secure laptop. This is on special due to my putting a couple light scratches on the lid while working on it. The specs are as follows:

- i7 CPU (versus the normal i5)


- 256GB SSD

- 15.6 inch Full HD touchscreen

- Full aluminum chassis with backlit keyboard

- SEPIO Secure OS (latest build)

This model normally goes for $1400, but I am knocking $100 off due to the scratch. My mistake is your gain....

As with all SEPIO's, the RAM and SSD can be upgraded on request.

The i7 models are rare, so get it while you can.

Tuesday, October 17, 2017

Important Update on Recent Hack of Wireless

As many of you are now aware there was a rather dangerous hack released the other day ( CVE-2017-13077) that affects nearly all devices' utilization of the WPA/WPA2 wireless security protocol. The details of which can be read about here:

Now before anyone panics I should point out a couple things:

1. A patch for this has been released already for the following distros:

    Linux Mint
    Debian (and most distros based on Debian)
    opesource Android Lineage OS

Simply run your update manager (or sudo apt update && sudo apt upgrade in terminal) and you are good to go.

2. If you were following my advice and utilizing the WPA2-CCMP/AES version as opposed to WPS or TKIP the damage would have been far less.

3. There are currently no patches available for:

    Windows (I know, shocking)
    Mac OSX
    non-Debian Linux (Suse, Fedora, Arch, etc)

If you are on one of these systems you need to:

- Use a wired connection if possible
- Use a VPN (OpenVPN protocol with RSA-4096 DHE, AES-265 and SHA2+)
- Make sure you have HTTPS Everywhere enabled in your browser
- Ensure that TLS 1.2 is being utilized by your browser and the sites you visit.

There was also a hack discovered in Adobe Flash, which if you have been paying attention happens on a fairly regular basis. There are patches available for Linux, but frankly I would just disable it in your browser (or uninstall it completely) as it is a constant attack surface anymore.

Keep in mind that digital security is a dynamic sport and requires constant vigilance on our part.

I will post any relevant updates to this issue.....

** Update **

- Microsoft is claiming that they have addressed the issue. So take that for what it's worth.

- Apple states they will have a patch available in a few weeks.


Thursday, October 5, 2017

SEPIO Secure Laptop Sale

SEPIO Secure Laptops will be on sale for $100 off normal price until November 1st.

Some of the recent system upgrades include:

- Added support for Yubikey secured boot

- Added support for KeepKey, Trezor and Ledger crypto-currency hardware wallets

- New artwork and icons

- Option for custom Secure Boot certificates

and many other software updates and upgrades.

Wednesday, September 13, 2017

Upcoming Courses

Can you actually protect yourself from online thieves, government snoops and malicious software?

What is the "Darkweb" and is there any legitimate use for such a thing?

What is Bitcoin and why should I concern myself with it?

How is the Internet Of Things dangerous to me?

Can the government read my emails and messages?

Can they break my encryption?

These are all common questions coming from the public on a more and more frequent basis and they are just a few of the questions that we answer in the GroundRod training series. The courses are designed for the layman and the professional alike and are hands on. You don't just listen to a lecture, you implement the subject matter in real time during class. We cover the spectrum from system hardening and secure communication to human tradecraft and escape & evasion skills. You leave class with a broader understanding of the threats and a real set of tools with which to protect yourself, your family and your business.

Upcoming courses:

12-15 October         GroundRod Primer & GroundRod 2      Atlanta, GA

28-29 October         GroundRod Primer                                   St Louis, MO

TBA  November     GroundRod Primer & GroundRod 2      San Francisco, CA

Contact us to register or to setup a new class in your area.

*** ALSO ***

Updated course review for Gunfight Concepts Carbine on the Course Reviews page.

Sunday, August 6, 2017

Tactical Skills Q & A -or- Be Good at Everything or Die

In the interest of spreading useful information regarding tactics/training I wanted to relay this conversation I had with some folks from the tactical community a while back. I was asked several pointed questions which I do my best to answer below:

Question 1:

Of all the various training disciplines available, which one should be top of the training list right now in light of world events? Rifle training? Land Navigation? Communications? Patrolling, etc...


Well, there are definitely some sacred cows on that list. It of course kind of depends on where you are as an individual with regard to the various skillsets, but lets assume you are a competent shooter with some basic fieldcraft under your belt....I would put information gathering on top. You could also label it Intel/Comms if you wanted. Why?

1. Intelligence drives the fight. Without it, you are just a bunch of armed guys in the woods.

2. Everyone can do it. Your 75 year old aunt can do it, your kid can do it. Not everyone can be an effective infantryman, but anyone can be eyes/ears/disseminators.

3. Right now nearly everyone sucks at it. I had a good buddy that was with CAG tell me once, "Everyone thinks our shooting is what makes us so effective, and while we are talented shooters there are certainly better out there....that is just a small part of what we do. It's all those other skills that make the difference".  I thought he made a very good point.....

Question 2:

What is the best fighting rifle?


Good lord. The one in your hands at the moment....but seriously, as my generic go-to-war rifle I would prefer a properly built AR15 carbine barring a mission that required a special applications rifle of some kind (see intel above). The caveat here being "properly built". As someone that has taught on a great many ranges over the years I can say that there are far too many cheap/poorly built/poorly maintained AR's out there. The best advice I can give here is seek out some armorer level training.....get to know your rifle inside and out. Learn how to diagnose strange rifle your gun over-gassed? maybe under-gassed? Keep a log of how many rounds you have put through the rifle and the individual high-stress parts, such as the barrel, bolt and recoil spring. There are a few items that ALWAYS travel with my carbine:

1. Spare bolt w/firing pin (they do break from time to time folks)

2. GI steel cleaning rod (ever get a barrel full of mud at the worst possible time?)

3. Lube (duh)

4. Small ziplock with spare pins/springs

5. Sharpie pen (saves your finger when clearing nasty malfunctions)

I may carry much more than this, but never less.

But what about stopping power and range? Look, no argument here that a 7.62mm NATO gun has better of both and if the METT-TC dictated it, that's what I would take. But consider this:

1. You can carry a lot more 5.56 than 7.62. Basic load management here folks.

2. With few exceptions, I still believe shot placement (aka, effective fire) has more to do with a positive outcome than the size of your gun or bullet.

3. If desired, you can utilize specialty ammunition that can extend the effective reach of your 5.56 gun. Like the Mk262 (77gr projectile), which we found to be very effective at one shot stops out to 700yds during OIF/OEF. Just make sure that your particular rifle can accommodate the heavier bullet. You generally want to stick with a 1in7 twist as opposed to the sportsman's 1in9 as you may end up with stabilization issues. Personally I favor the 1in8 barrels....good stabilization for a wide spectrum of rounds and good barrel life as well.

And lets not forget that the AR carbine platform is almost like a Lego set in it's ability to be customized for the man and the mission. There are endless manufacturers of high quality parts for the platform out there, many offering far better than "MILSPEC" quality. And while we're at it....MILSPEC is not a statement of high quality, it's a "minimum acceptable standard". Your off the shelf LaRue carbine is going to greatly exceed the standards of the M4 issued to Joe infantryman. Don't be beguiled by gun shops selling expensive MILSPEC labeled rifles.

And for you folks that have chosen to embrace the AK platform (or SIG or HK or whatever), more power to you. Just don't think for one second that the same rules/concerns don't apply to you. All machines will invariably fail at some ready for it.

Question 3:

Optics or irons?


Depends......if I want to be as effective as possible I use optics. Not to be a funny guy but look, the evidence is overwhelming. You take any shooter and give him optics and he will shoot faster and more accurately. I still train with irons of course, but they are a back-up.....not a primary tool. I don't know what else needs to be said on that.

Okay, what kind of optic?

I'll assume we are still talking carbine here and not precision/sniper rifles. The 1-4 and 1-6 variable scopes are really nice as they give you the "best of both worlds" so to speak. You can dial down and have a reflex sight or dial up for distance shots or glassing an area. For out and out speed, it is pretty hard to beat an EOtech "dot-in-a-donut" sight (1 MOA dot with a 65MOA circle). SIG actually has a similar sight out now that has picked up some of the big Federal contracts that EOtech lost recently. It employs a 2 MOA dot w/ 65MOA circle (you can toggle between dot and dot/circle on some models) and comes in a much more compact package. I should point out that the SIG Romeo sights are made by Holosun, so if you want to save some scratch go buy the Holosun version. The SIG and HS sights can also be had with a small integrated solar panel, thus greatly extending the normal scant 7 year battery life of the unit.
One plus I should mention regarding the variable scopes is that they usually have a glass-etched reticle as well as an illumination system, so if your battery does happen to die at an inopportune time you don't lose your ability to aim. But of course good pre-mission checks would prevent such an occurrence, no? A con for the variable scope is that it does have a specific eye-relief which a reflex site does not suffer from.

Question 4:

Is it worth it to have a kevlar helmet? or heavy armor plates for that matter?


Anything that keeps a high speed piece of metal from entering my person is a good thing. That being said it is always a matter of balance and METT-TC (I know, we blame everything on METT-TC). We have had amazing advances in armor technology over the last twenty-so years and it would be foolish to ignore them if we are going to be going into harm's way. Helmets have become lighter, stronger and a force multiplier of sorts. They not only protect our heads, but are a platform for mounting our NODs, IR identifiers and lights (ask any 18D that has had both hands buried in a dude's guts if that helmet light was handy). So yes, get a good helmet. If you are conducting low-pro operations, stick it in your go-bag.
As far as body armor and plates go, a lot of lives have been saved by SAPI plates. I just recommend not going too overboard with your armor (like our incredibly risk-averse military does now) or you risk it becoming a hindrance rather than a help. My general rule on this is that I try to achieve a degree of balance between my defensive and offensive capabilities with the offensive side favored. I would prefer to wear a simple plate hanger as opposed to  a full wraparound, shoulder protector-groin protector neck-protector monstrosity that had as good a chance as the enemy at putting me into the medic's gentle caress. You just have to get out there and train with this stuff on and figure out the sweet spot. And train in crappy weather too.....train when it's crazy hot and crazy cold. Better to know now than later.

Question 5:

Do you train more with pistol or rifle?


Pistol.  It's harder to be good with a pistol than a rifle. Pistols suck compared to rifles at putting down a threat so shot placement and follow ups are crucial. I spend most of my day with a pistol. It would cause a scene if I slung up my carbine and went grocery shopping with the kids.
I think it's even more important with a pistol to choose quality ammunition. Something with a solid, real world stopping record like Speer Gold-Dot or Winchester Ranger. Something bonded, so it doesn't shed all it's mass when you shoot through a barrier like glass. And if you are going to roll with +P or hot loads, make sure that you train with them as the recoil management differences can be significant.
And while we are on the subject of pistols.....if you spend most of your time carrying concealed then you need to train in that configuration. Too many guys show up for a class and are decked out ready for war with overt carry holsters. That's fine and all, but you need to spend the most time training how you spend the most time carrying.

Question 6:

What is the most important piece of gear I could have right now that I probably don't own?


Easy. Night vision devices. I tell folks, if you have seven rifles but no night vision, it's time to sell a few rifles and get some NODs. No other item can have as significant an effect on your survival on a battlefield in my opinion. All state level actors (good or bad) have them. The cartels have them. The terrorists for the most part have them. And if the world goes sideways - you can bet that battlefield recovery ops will have them in the hands of a great many potential adversaries. Don't mess around on this one folks.....go get yourself a set of PVS-14's from a reputable source. You want the single battery model (the dual battery model would break if you looked at it wrong) with a Gen 3 Pinnacle auto-gated tube.

After that it would probably be a digital trunking scanner. Priceless tool right there. If you are behind on your radio comms seek out the AmRRON folks and jump into one of Sparks33's classes.

Question 7:

You preach soft skills like what you teach in the Groundrod courses and Sam Culper teaches in his intel courses as being critical right now, but what other hard skills should we be looking at besides the big ones mentioned earlier?


Well, driving for one. We spend a sizable amount of time in our non-armored vehicles driving around and if things ever go sideways it will only be a matter of time before you have to deal with the following scenarios:

1. Hostile government checkpoints

2. Local hoodlum roadblock

3. Vehicle breakdown in middle of nowhere, or hostile area

4. Vehicle hijacking attempts (static)

5. Vehicle hijacking attempts (kinetic)

6. Vehicle hacking

7. Driving into ambush

Your intel/comms/route planning skills are going to become paramount when you don't have an armored rig to drive around in......and who of us normal folks have that option?

There are a few different aspects to this subject, one being how to setup and equip the vehicle itself:

- Mechanical emergency counter measures
- Medical
- Comms
- IR lights and kill switches (you have NODs right?)
- Basic survival gear (think Maslov)
- Weapons/ammo

and then there is the actual driver skill set. Really the only good way to get this is to spend the time and money to attend a tactical driving course and EVOC doesn't cut it for you first responders out there. You combat vets that have spent time driving up and down J-bad road or route Irish are going to be ahead of the game, but you are still going to want to seek out those skills. Driving an armored Hummer is not the same as driving your family sedan under extreme conditions. I speak from experience......

Besides driving.....I would look into medical training. Wilderness EMS training is about as close as you will get to austere medicine here in the land of civility. If you are lucky enough to find it, there is no replacement for live tissue training (aka, Goat Lab). There are sources out there....ask me if you need help.

Sanitation skills. Herbal medicine skills. Basic engineering/building skills. Old-school Land Nav (there is a reason USASOC and JSOC have such a strong initial focus on this) Languages (I know, more of a soft skill) You know....everything.


Regarding the first part of the vehicle issue, I have a course I am fielding shortly that covers this. Setting up your rig, equipping your team in a low-pro fashion, vehicular overwatch, surveillance detection routes, cleaning runs, fighting out of and into a vehicle and more. I will post it to the site when the dates are established.

Wednesday, August 2, 2017

Full Spectrum Training.....does it matter?

 So I know the question is out there....why is this website supposedly devoted to the study of warfare always talking about computer security and cryptocurrency? Shouldn't I just be posting articles about "improving your shot group" or the latest in "tactical accoutrements"? It essentially boils down to this:

1. As anyone who has attended my courses knows, I believe in what I call "The Heinlein Doctrine" (or the Competent Man principal). In essence, a warrior (or just a human being for that matter) must be good at everything...not just shooting, or grappling, or navigating.

2. Right now, technology is at the forefront of not just battle, but our everyday it or not.

3. Many believe that war lies in the not too far future of the western world. I believe that this war has already begun. Perhaps not the shooting part, but the IPB (Intelligence Preparation of the Battlespace) has begun in earnest in the technical space. We ignore this aspect of the battlefield at our greatest peril.

4. And finally, there are hundreds of sources these days for sound tactical training, but very few sources for full spectrum training exist.


  "A human being should be able to change a diaper, plan an invasion, butcher a hog, conn a ship, design a building, write a sonnet, balance accounts, build a wall, set a bone, comfort the dying, take orders, give orders, cooperate, act alone, solve equations, analyze a new problem, pitch manure, program a computer, cook a tasty meal, fight efficiently, die gallantly. Specialization is for insects."

-- Robert Heinlein (From Time Enough For Love)


I should point out that I do in fact have some "hard skill" courses coming up:

- Gunfight Concepts Carbine  -  AUG 19-20   CDA, ID

- Low-Pro Tactical Vehicle Operations  -  SEP  tba

- Home Defense CQB (force on force)  -  OCT  tba

I also have the GroundRod cyber defense series of courses in:

- GR 1 & 2  -  Scranton, PA  AUG 10-13

- GR 1 & 2  -  Eugene, OR  AUG 24-27

- GR 1 & 2  -  San Francisco, CA  SEP tba

- GR 1 & 2  -  Atlanta, GA  OCT  12-15 

Which brings me to my point -

   One of the subjects that I cover in the GroundRod training series is that of crypto-currency (Bitcoin, etc). Simon Black from SovereignMan sent me an excellent piece recently on Crypto 101...

    "Commerce on the Internet has come to rely almost exclusively on financial institutions serving as trusted third parties to process electronic payments. While the system works well enough for most transactions, it still suffers from the inherent weaknesses of the trust based model. Completely non-reversible transactions are not really possible, since financial institutions cannot avoid mediating disputes.

    The cost of mediation increases transaction costs, limiting the minimum practical transaction size and cutting off the possibility for small casual transactions, and there is a broader cost in the loss of ability to make non-reversible payments for nonreversible services. With the possibility of reversal, the need for trust spreads.

    Merchants must be wary of their customers, hassling them for more information than they would otherwise need. A certain percentage of fraud is accepted as unavoidable. These costs and payment uncertainties can be avoided in person by using physical currency, but no mechanism exists to make payments over a communications channel without a trusted party.

    What is needed is an electronic payment system based on cryptographic proof instead of trust, allowing any two willing parties to transact directly with each other without the need for a trusted third party. Transactions that are computationally impractical to reverse would protect sellers from fraud, and routine escrow mechanisms could easily be implemented to protect buyers."

-- Satoshi Nakamoto

   I strongly encourage you to READ the full article by Ben Yu as it gives an exceptionally thorough breakdown of what crypto is and why it matters. As the saying goes....there will be a test...

Tuesday, June 6, 2017

Those Sneaky Dots

As I have been pointing out in the GroundRod courses for years, your printer can "tattle" on you. 

Case in point:

"According to Rob Graham, who writes for the blog Errata Security, the Intercept’s scanned images of the intelligence report contained tracking dots — small, barely visible yellow dots that show “exactly when and where documents, any document, is printed.” Nearly all modern color printers feature such tracking markers, which are used to identify a printer’s serial number and the date and time a page was printed."

Full article

So the most recent NSA leaker was rather quickly outed due to barely visible yellow dots that are surreptitiously placed into every document printed by nearly every printer in existence.

I encourage you to check out the EFF's guide HERE for finding and decoding your printer's secret messages.

Friday, May 19, 2017

GroundRod 1 & 2 Idaho, June 1-4 Update

The GroundRod Primer course for CDA, Idaho is completely full and we have 2 seats left for GroundRod 2.

If you did not make it into this class we have some upcoming dates in the Northwest:

- June 15-18    Eugene, OR

- July 6-9         Prosser, WA

- July 14-17     Buffalo, WY


Outside the NW:

- July 29-30        LasVegas, NV  (after Blackhat 2017)

- August 10-13   Scranton, PA

Reserve your spot before they fill up.

Wednesday, May 17, 2017

Update on Intel AMT Exploit

As many of you are aware, a rather onerous firmware exploit was discovered in February that affects most modern Intel processors. The exploit has been dubbed "Silent Bob Is Silent" and can grant an adversary remote access to your computer beneath the OS level. This not only affect Windows machines but Mac and Linux as well.

“The exploit is trivial, max five lines of Python, could be doable in one-line shell command. It gives full control of affected machines, including the ability to read and modify everything. It can be used to install persistent malware (possibly in firmware), and read and modify any data. For security servers, it may allow disabling security features, creating fake credentials, or obtaining root keys. …  IT folks, KEEP WORKING THROUGH THE WEEKEND, DISABLE AMT NOW or block access to it. This can get ugly.”

Read the full piece HERE

The linked post will cover some methods for determining if your system is vulnerable. It should be noted that the Intel vPro model CPUs are most vulnerable.

I should point out that the SEPIO laptops are not vulnerable to this exploit.

Note:  A quick fix you could employ while waiting for a patch is to block the following ports in your router/AP firewall: 16992, 16993, 16994, 16995, 623, 664. This will block it for the time being. I would also disable IPv6 as it uses random IPv6 ports.

Friday, May 12, 2017

Be Careful What You Click

Those leaked NSA TAO tools have been in the wild for a few weeks now.....and now we have this.

"According to CrowdStrike's vice president of intelligence Adam Meyers, the initial spread of WannaCry is coming through spam, in which fake invoices, job offers and other lures are being sent out to random email addresses. Within the emails is a .zip file, and once clicked that initiates the WannaCry infection.

But the most concerning aspect of WannaCry is its use of the worm-like EternalBlue exploit. "This is a weapon of mass destruction, a WMD of ransomware. Once it gets into an unpatched PC it spreads like wildfire," he told Forbes. "It's going through financials, energy companies, healthcare. It's widespread."

Given the malware is scanning the entire internet for vulnerable machines, and as many as 150,000 were deemed open to the Windows vulnerability as of earlier this month, WannaCry ransomware explosion is only expected to get worse over the weekend."

Read the whole piece here WannaCry exploit


The WannaCry malware currently is wreaking havoc with the  UK healthcare system.

This attack uses the leaked Eternalblue malware from NSA and is a nasty one. Yet another reason to move away from Windows and into a Linux based distro (preferably a hardened one).

BlackHat 2017 Convention & GroundRod

Blackhat 2017 Info

I will be attending the 2017 Blackhat convention in Vegas July 22-27. If there is interest I can schedule a GroundRod course in Las Vegas to run right after the conference.

Any interested parties email me and we will see if we can make it happen.

Thursday, May 11, 2017

More Shenanigans from the No Such Agency folks

"A very important question remains: What exactly could WindsorBlue, and then WindsorGreen, crack? Are modern privacy mainstays like PGP, used to encrypt email, or the ciphers behind encrypted chat apps like Signal under threat? The experts who spoke to The Intercept don’t think there’s any reason to assume the worst.

“As long as you use long keys and recent-generation hashes, you should be OK,” said Huang. “Even if [WindsorGreen] gave a 100x advantage in cracking strength, it’s a pittance compared to the additional strength conferred by going from say, 1024-bit RSA to 4096-bit RSA or going from SHA-1 to SHA-256.”

Translation: Older encryption methods based on shorter strings of numbers, which are easier to factor, would be more vulnerable, but anyone using the strongest contemporary encryption software (which uses much longer numbers) should still be safe and confident in their privacy."


Read the full article here Intercept Article and make sure you grok the implications.

- You are using strong passwords/passphrases, right?

- You are using minimum RSA-4096 (and getting comfortable with ECC non-NIST curves), yes?

- And of course you are dating/replacing your passwords and PGP keys on a regular basis?

Privacy/Encryption is a dynamic sport.....don't ever forget that fact.

Wednesday, May 3, 2017

GroundRod in Central Oregon and Central Florida

There will be a GroundRod Primer in the Bend, OR area on May 13-14.  There will also be a GroundRod Primer in the Fort Meyers, FL area May 27-28.

Contact me if you wish to register for either course.

Sunday, April 23, 2017

Simple Faraday Shielding

"Faraday Cage".......

The phrase invokes images of Gene Hackman's rouge NSA character from the film Enemy of the State, hacking away from the safety of his wire copper mesh "office". It also brings up thoughts of nuclear detonations and solar coronal mass ejections frying everything from televisions to the family car.

We'll save the intricacies of those scenarios for a later article. What I want to address today is basic RF (radio frequency) shielding in a practical sense. As I see it, there are four basic aspects to how we may use shielding, whether it be an RF blocking pouch for our phone or a grounded, sealed, galvanized trashcan for our spare equipment (post apocalyptic resupply of course). They are:

1. Preventing our device from being exploited 

2. Preventing our device from exploiting us

3. Preventing unwanted destruction of our device 

4. Protecting our health

These should all be pretty self explanatory, but lets touch on each real quick.

1. This could be anything from a hacker planting ransomware on your device, to the government tracking your messages and accessing your microphone and/or camera.

2. Your phone in particular, and your computers and tablets to some degree, are constantly reporting your whereabouts to your service provider and whomever they share that data with. With phones this can range from cellular tower triangulation to the more nefarious IMSI sniffers/spoofers.

3. This would likely only occur during a nuclear event that is very nearby or that triggered a carrington effect covering a much broader geographical area.

4.  Any medical practitioner will tell you - no amount of RF radiation is healthy for the human body. We are bombarded with RF of varying intensity all day long. It could be the cell phone pressed against our skull or the wireless router in our house blasting us day and night.

One could build an "RF safe room" in their home to mitigate some of the above. You can purchase rolls of the RF attenuating fabric online (same stuff that lines the phone RF pouches), but what might be more practical is to just paint the room. There is a company that produces an RF/EMF blocking paint that claims up to 30dB of attenuation per coat. LessEMF Paint markets the paint. Bear in mind that if you want this to be a "clean" room you will need to remove all light fixtures, outlets, switches and paint every surface (floors and ceilings).

Might be worth having a small office in your abode that is RF for thought.

I should probably point out that the EMF paint is not likely to protect your equipment from a high powered EMP burst. You would want something more substantial for that purpose.

Tuesday, April 18, 2017


Well, it has been an interesting couple of months in the world of privacy and cyber security. We had the "vault 7" leaks, then we just had the NSA's TAO hacking tools released into the wild for any and all to use. So now we don't have to be concerned only about nation-states wielding those kinds of tools, but potentially every criminal element out there. Many INFOSEC researchers have pointed out that this makes Windows vulnerable to a wide assortment of attacks. Ironically, their "fix" is telling everyone to upgrade to Windows 10!! An operating system that, near as I can tell, was built from the ground up to spy on you.....what a joke!

The GroundRod series of courses continues to grow in popularity as people around the country are realizing that no one will save them....they have to save themselves! We have a very full class coming up the end of April in Tennessee as well as a full class in northern Idaho in June. Here are some of the courses that are still open for enrollment:

* May 13-14          GroundRod 1   in Bend, OR

* May 27-28          GroundRod 1   in Fort Meyers, FL

* June 1-4              GroundRod 1 & 2   in CDA, ID

* June 17-18          GroundRod 1   in Eugene, OR

* July 14-17           GroundRod 1 & 2   in Buffalo, WY

* July TBA            GroundRod 1 & 2   in Prosser, WA

* August 11-14      GroundRod 1 & 2   in Scranton, PA

We also have a Gunfight Concepts Carbine 1 course in Central WA for June 10

You can register for any class by visiting the Store page and making a $100 class deposit, then emailing me with the requested course and date.

We still have a few SEPIO laptops and VERUS phones in stock with more on the way.

Tuesday, March 14, 2017

GroundRod 2 in Texas ** UPDATED March 20 **

** UPDATE **

We have changed the class dates on this course to April 1-2. 

I have some extra seats available now for the GroundRod 2 class in Midland, TX March 25-26. If you are interested in attending, let me know as my classes have been filling up quick lately.

Wednesday, March 8, 2017

SEPIO Secure Laptops

Starting in April the base price of the SEPIO Secure Laptop will move to $1200 due to increasing hardware prices and increased demand necessitating the hiring of extra help.


Some notes regarding recent upgrades to the SEPIO OS system:

- Added protection against "STUXNET" style BadUSB attacks.

- Increased encryption strength beyond industry standards.

- Hardware drive encryption (AES-256)

- Added extra protections against "brute-force" password attacks.

- Created separate menu entry for all HAM radio software.

- Upgraded Grsecurity kernel to 4.9 series.

-Can now make ECC GPG/PGP keys with non-NIST curves.

-Virtual machine upgrade.

-Option for non-NIST system encryption (Serpent vs AES)

-Randomized DNS queries via non-logging OpenNIC servers.

-Switched TOR browser from standard to hardened edition w/secure defaults.

-Several software upgrades - BitMessage, AirVPN, Safejumper, BitSquare, Exodus wallet, I2P, OnionShare, Cloak and many more.

Saturday, February 11, 2017

Class Availability

The upcoming GroundRod Primer & GroundRod 2 back-to-back courses scheduled for April 27-30 in Clarksville, TN are just about booked full. If you are planning on attending this venue and have not already reserved your seat, you need to get a hold of me as there are only a few seats left.

There are some seats left for the GroundRod Primer & GR2 scheduled for February 24-27 in Columbus, OH due to a couple cancellations.


We are looking to set up courses in North Carolina, Florida, Wyoming, Nevada and Hawaii in the coming months. If any of those locations interest you, get a hold of us and we will get the class built.

Thursday, February 9, 2017

GroundRod Primer Course Review via Forward Observer

Sam Culper from Forward Observer hosted a GroundRod Primer down in Austin, Texas last week and just released a course review...

Forward Observer Review

Saturday, January 28, 2017

Encryption Update ** UPDATED **

(Update at the bottom)

So, the NSA and IAD just released an advisory memo directed at US government entities and NGOs/Corporations that deal with classified material. In a nutshell, they are raising the minimum required encryption level for top secret data effective immediately. So instead of referring to the NSA's Suite B cryptography, we will now refer to what they are calling the Commercial National
Security Algorithm Suite. The changes are as follows:

Former Suite B standards

- RSA-2048                                       (Key exchange/Digital Sig)
- ECDH/ECDSA P-256                    (Key exchange/Digital Sig)
- AES-128                                         (Symmetric encryption)
- Diffie-Hellman 2048                      (Key exchange)
- SHA-256                                        (Integrity check/hash)

New NSS standards

- RSA-3072                                      (Key exchange/Digital Sig)
- ECDH/ECDSA P-384                   (Key exchange/Digital Sig)
- AES-256                                        (Symmetric encryption)
- Diffie-Hellman 3072                     (Key exchange)
- SHA-384                                       (Integrity check/hash)

Okay great.....what does this mean to you?

Well, for one, if the NSA feels there is a threat great enough to warrant raising these standards to protect national security structure, then it only makes sense for the public to do the same. After all, I place I high value on my privacy and the sanctity of my "data".

Things you should be checking:

1. Your VPN provider (you are using a VPN, right?). Most of the providers I recommend already meet or exceed the new standards. There are, however, some that still employ RSA-2048 and AES-128. Find out what your provider is using and if it does not meet the standard as set forth above I would contact them and encourage them to implement it as soon as possible.....or move to a different provider.

2. Your PGP/GPG keys. More and more people are discovering and utilizing GPG encryption for their mail and personal file security. I have noticed though that many of the people that contact me via GPG are still using RSA-2048 keys. I would encourage you to switch to the stronger RSA-4096 keys (or better yet, ECC keys with non-NIST curves....if you are savvy with the terminal).

These couple of steps will greatly increase your personal/business security level and, frankly, are pretty painless to implement.

I should note that you will get hands on experience with these techniques at my GroundRod 2 course.

***  UPDATE ***

We looked at the Suite B standards and the new NSS standards, here are my recommendations:

For key negotiation/exchange:

      - RSA-4096
      - ECC Brainpool P-384 or P-512
      - ECC Curve25519
      - DH 4096

For symmetric (payload) encryption:

      - Twofish / Threefish
      - Serpent
      - AES-256

For integrity check/hash:

      - SHA-512
      - Whirlpool

 As you can see, I favor non-NIST standards as much as possible. For most VPN providers you are stuck with AES for channel encryption, however, and a couple others are working on implementing Serpent and Twofish as an option.

Wednesday, January 18, 2017

First GroundRod 2 Student Review

I just received a very humbling course review from one of the students from my recent GroundRod 2 course in Arizona. Here it is....


Praise for GroundRod2

* K is the Marcus Aurelius of Cyber Privacy and Security.

* Groundrod2 (GR2) was awesome. If you thought Groundrod1 was good, GR2 is even better

* K is an incredible instructor. He offers a wealth of experience and expertise related to privacy, security and liberty. The course is not just for those who like to be prepared, people who live off-grid, etc. GR2 is a hands-on, cyber security “boot camp” for freedom-loving Americans who cherish their constitutional rights. The training course is immersive, takes place in a small class environment while the goal for students is to leave with cutting-edge skills they can immediately apply in their daily life.

* K’s classes can be understood by individuals as well as both the business and the technical side of any organization. By way of example, K’s military and technical expertise combined with his attention to detail allow him to walk through complex scenarios and use cases with ease while applying risk principles to each situation so students can visualize the best outcome and discern the reasoning behind the analysis.

* K’s course will empower students with the skills and tools needed to win the battle against the wide range of cyber adversaries who want to harm you, your family and your environment.

*GR2 was a high-quality learning experience against a backdrop of constantly changing technologies and threats. Put another way, K’s class is a “Proving Ground” for all the latest, best and most secure technologies to safely and securely communicate.

*It’s clear based on the quality of class instruction and extensive classroom training tasks, K has extensive experience with successful classroom teaching techniques and delivering technical training for adult learners in corporate, government and military environments.

* Heaven forbid, but ... If Weimar Germany in 1923 or Venezuela in 2017 are any indication of what may happen here in the future in the US; If you care about your family, friends and loved ones and want to have the ability to communicate candidly, effectively and securely in a potentially hostile environment, you will want to take this class.

* Most people view insurance as something they need for their car, home or if they die ... for their loved ones after they pass on. Think of K’s class as insurance against “Normalcy Bias”. It’s the elixir against denial for what we already know is a mathematical certainty (the US Government will default on the 20T in national debt in the near future). Very few people have the skills and know-how to communicate securely over long distances with others in a hostile environment. And, you will be equipped with knowledge that will be in exceptionally high demand.



My thanks to the wonderful students down in Arizona. Their quest for excellence, fearless questioning and overwhelming generosity represent the things that keep me going.

Wednesday, January 4, 2017

Upcoming Courses

GroundRod 2 is here and covers the following:

- Review of GroundRod Primer skills

- Discussion of current events as they relate to privacy, security and liberty

- In depth study of the Invisible Internet Project / I2P

- Setting up anonymous mail service via I2P

- Exploration of Zeronet and other distributed networking systems

- Setting up and using Retroshare with extra anonymity

- The latest in encryption techniques, including ECC

- Setting up open source router firmware

- Metadata analysis

- Testing secure alternatives to Skype and other mainstream teleconferencing software

- The latest in crypto-currency trends, techniques and software

- Real-world tradecraft application

- Setting up resilient, "Ministry of Truth" proof websites

- Hands on training for SEPIO laptop owners

- and tons more.........


These are the current course dates. Contact me if you want to reserve a seat or if you wish to host a course in your area. Cost is still just $350 (per course).

GroundRod 2                          --  Phoenix, AZ  -- 14-15 January

GroundRod Primer                --  Austin, TX -- 4-5 February    w/ Forward Observer

GroundRod Primer & GR2   --  Columbus, OH -- 24-27 February

GroundRod Primer & GR2   --   Clarksville, TN  --  27-30 April

The privacy fight is far from over folks.......regardless of who is occupying the White House.

** UPDATE **  For those of you attending any of the double classes (GR1 & 2) you only need to make one $100 class deposit as opposed to a $100 deposit twice for each course.