Showing posts with label Guide. Show all posts
Showing posts with label Guide. Show all posts

Saturday, April 5, 2014

The Complete Interactive Guide To How The NSA Spies On Everything You Do

At Not Just The News, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Not Just The News and how it is used.


Log Files


Like many other Web sites, Not Just The News makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Not Just The News does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Not Just The News.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Not Just The News and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Not Just The News send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Not Just The News has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Not Just The News"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



The Complete Interactive Guide To How The NSA Spies On Everything You Do

Tuesday, April 1, 2014

Emoticon Guide

At Not Just The News, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Not Just The News and how it is used.


Log Files


Like many other Web sites, Not Just The News makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Not Just The News does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Not Just The News.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Not Just The News and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Not Just The News send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Not Just The News has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Not Just The News"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Emoticon Guide

Tuesday, March 18, 2014

Breaking the Basketball Bracket: A Guide to the South Region

At The Daily News Source, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by The Daily News Source and how it is used.


Log Files


Like many other Web sites, The Daily News Source makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


The Daily News Source does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on The Daily News Source.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to The Daily News Source and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on The Daily News Source send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


The Daily News Source has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. The Daily News Source"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Breaking the Basketball Bracket: A Guide to the South Region

Breaking the Basketball Bracket: A Guide to the South Region, II

At The Daily News Source, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by The Daily News Source and how it is used.


Log Files


Like many other Web sites, The Daily News Source makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


The Daily News Source does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on The Daily News Source.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to The Daily News Source and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on The Daily News Source send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


The Daily News Source has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. The Daily News Source"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Breaking the Basketball Bracket: A Guide to the South Region, II

Sunday, March 16, 2014

New Guide: Unionbusters 101

At A Political Statement, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by A Political Statement and how it is used.

Log Files

Like many other Web sites, A Political Statement makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons

A Political Statement does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie

  • Google, as a third party vendor, uses cookies to serve ads on A Political Statement.
  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to A Political Statement and other sites on the Internet.
  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on A Political Statement send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

A Political Statement has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. A Political Statement"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.


New Guide: Unionbusters 101

Friday, February 21, 2014

A Guide To Psychoactive Plants In The Bible

burning_bushSuppose Christians took a closer look at what their holy book is truly discussing? NeuroBrainstorm looks at a wide range of biblically-key plants with mind-altering properties:



Holy Anointing Oil – (Leviticus 10:6) Then took Mary a pound of ointment of spikenard, very costly, and anointed the feet of Jesus, and wiped his feet with her hair: and the house was filled with the odour of the ointment. (Exodus 29:7) Then shalt thou take the anointing oil, and pour it upon his head and anoint him.


The holy anointing oil is a potent psychedelic extract…essentially an anxiolytic-hallucinogen. The transdermal application of it led to its absorption and psychoactive effects, even in extremely low doses. The bible suggests anointing with a large amount of oil possibly to ensure a psychedelic response.


Manna – (Exodus 16 14, 31) Behold…there lay a small round thing, as small as the hoar frost on the ground. And the house of Israel called the name thereof Manna: and it was like coriander seed, white; and the taste of it was like wafers made with honey.


Manna was a holy food that was white and brown, circle shaped, and would appear in the morning dew. The Israelites would live off it when traveling from village to village. Once they got near a village, it would disappear. Terrence Mckenna suggested that this was the exact description of psilocybin-containing mushrooms.


(Song of Songs 4:13-15) Your plants are an orchard of pomegranates with choice fruits, with henna and nard, nard and saffron, calamus and cinnamon, with every kind of incense tree, with myrrh and aloes and all the finest spices. You are a garden fountain, a well of flowing water streaming down from Lebanon.


Spikenard, also called nard, is an anxiolytic and nootropic. Jesus was anointed with a big jar of spikenard. Spikenard increases gaba as well as serotonin in the brain. Saffron is a spice derived from the crocus flower. It is shown to be an anti-depressant in humans.




disinformation



A Guide To Psychoactive Plants In The Bible

A Guide To Psychoactive Plants In The Bible

At Those Damn Liars, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Those Damn Liars and how it is used.

Log Files

Like many other Web sites, Those Damn Liars makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons

Those Damn Liars does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie

  • Google, as a third party vendor, uses cookies to serve ads on Those Damn Liars.
  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Those Damn Liars and other sites on the Internet.
  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Those Damn Liars send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

Those Damn Liars has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Those Damn Liars"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.


A Guide To Psychoactive Plants In The Bible

Friday, February 14, 2014

The People"s Valentine: Safe Guide to Dating Dictators

At Hey WTF? News, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Hey WTF? News and how it is used.

Log Files

Like many other Web sites, Hey WTF? News makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons

Hey WTF? News does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie

  • Google, as a third party vendor, uses cookies to serve ads on Hey WTF? News.
  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Hey WTF? News and other sites on the Internet.
  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Hey WTF? News send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

Hey WTF? News has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Hey WTF? News"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.


The People"s Valentine: Safe Guide to Dating Dictators

Wednesday, February 12, 2014

Julie Rath: Your Guide to Stylish Ski Attire

At Those Damn Liars, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Those Damn Liars and how it is used.

Log Files

Like many other Web sites, Those Damn Liars makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons

Those Damn Liars does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie

  • Google, as a third party vendor, uses cookies to serve ads on Those Damn Liars.
  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Those Damn Liars and other sites on the Internet.
  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Those Damn Liars send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

Those Damn Liars has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Those Damn Liars"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.


Julie Rath: Your Guide to Stylish Ski Attire

Tuesday, January 28, 2014

College Humor"s Handy Guide to Singles" Grocery Shopping

At Hey WTF? News, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Hey WTF? News and how it is used.

Log Files

Like many other Web sites, Hey WTF? News makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.

Cookies and Web Beacons

Hey WTF? News does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.

DoubleClick DART Cookie

  • Google, as a third party vendor, uses cookies to serve ads on Hey WTF? News.
  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Hey WTF? News and other sites on the Internet.
  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Hey WTF? News send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.

Hey WTF? News has no access to or control over these cookies that are used by third-party advertisers.

You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Hey WTF? News"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.

If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.


College Humor"s Handy Guide to Singles" Grocery Shopping

Monday, December 30, 2013

What"s a Motherboard? Newegg TV"s Tutorial and Shopping Guide


http://www.newegg.com | Mobos: http://bit.ly/1fFoTIz Welcome to our latest Newegg TV tutorial! Knowing the parts of a PC and what tasks they perform can be v…



What"s a Motherboard? Newegg TV"s Tutorial and Shopping Guide

What"s a Motherboard? Newegg TV"s Tutorial and Shopping Guide


http://www.newegg.com | Mobos: http://bit.ly/1fFoTIz Welcome to our latest Newegg TV tutorial! Knowing the parts of a PC and what tasks they perform can be v…



What"s a Motherboard? Newegg TV"s Tutorial and Shopping Guide

What"s a Motherboard? Newegg TV"s Tutorial and Shopping Guide


http://www.newegg.com | Mobos: http://bit.ly/1fFoTIz Welcome to our latest Newegg TV tutorial! Knowing the parts of a PC and what tasks they perform can be v…



What"s a Motherboard? Newegg TV"s Tutorial and Shopping Guide

Friday, November 1, 2013

How to hide from Predator Drones UAV – Unmanned Aerial Vehicles Survival Guide


How to hide from Predator Drones UAV – Unmanned Aerial Vehicles Survival GuideUS Crow


The General Atomics Predator Drone is an unmanned aerial vehicle (UAV) typically operated by US Air Force AFSC 1U0X1, UAS – Unmanned Aerospace System Sensor Operators. Drones are equipped with the AN/AAS-52 Multi-spectral Targeting System, armed with GBU-12 Paveway II laser guided munitions, camera (generally used by the pilot for flight control), a variable aperture infrared camera (for low light/night), and a variable aperture day-TV camera. The Predator Drone is an armed, multi-mission, medium-altitude, long endurance remotely piloted aircraft (RPA) that is employed primarily in a killer/scout role as an intelligence collection asset and secondarily against targets.  


The aircraft can employ two laser-guided AGM-114 Hellfire missiles which possess a highly accurate, low collateral damage, and anti-armor/anti-personnel engagement capability. The MQ-1B Predator handles reconnaissance while MQ-9 Reaper is used primarily “in a hunter/killer role,” and secondarily for intelligence. The drone endurance is more than 40 hours and the cruise speed is over 70kt. The air vehicle is equipped with UHF and VHF radio relay links, a C-band line-of-sight data link which has a range of 150nm and UHF and Ku-band satellite data links.


The targeting system is a primary threat. The MQ-1B carries the Multi-spectral Targeting System (MTS-A) which integrates an infrared sensor, a color/monochrome daylight TV camera, an image-intensified TV camera, a laser designator and a laser illuminator into a single package. The effective operational radius of the aircraft is about 459 miles.


How to hide from Predator Drones UAV – Unmanned Aerial Vehicles FLIRUAV remote sensing functions include electromagnetic spectrum sensors, gamma ray sensors, biological sensors, and chemical sensors. A UAV’s electromagnetic sensors typically include visual spectrum, infrared, or near infrared cameras as well as radar systems. Click here to download the JFCOM UAS – A detailed explanation of drone operations, schematics, and capabilities that include;


  • Full-color nose camera that the pilot uses primarily to navigate the craft

  • Variable aperture camera (similar to a traditional TV camera)

  • Variable aperture infrared camera for low-light and night viewing

  • Synthetic aperture radar (SAR) for seeing through low visibility

Why are drones a threat to Americans?


DOJ Eric Holder recently wrote about the use of drones on American soil;


“For example, the president could conceivably have no choice but to authorize the military to use such force if necessary to protect the homeland in the circumstances like a catastrophic attack like the ones suffered on December 7, 1941, and September 11, 2001,” – Eric Holder Attorney General of the United States – Department of Justice


The federal government has increased hostile behavior towards law-abiding constitutional citizens that simply wish to live free. If you have read our previous article The American Government Continues to Target Preppers, you are fully aware that the Department of Homeland Security (the guys who now control domestic drones) have classified survivalists, preppers, veterans and constitutional conservatives as potential terrorists. In addition to DHS targeting Americans, purchasing millions of rounds of ammunition, and a couple thousand UPV – Urban Pacification Vehicles, while states like Colorado force retailers to report citizens who purchase food in bulk as ‘suspicious’. As of March, 2013 – the FAA has authorized over 106 Government ‘Entities’ to fly domestic drones.


To be adequately prepared means understanding the fundamental dynamics of drone evasion and survival. Over the past few years people have scrambled for ways to evade and disable predator drones. Militias and military organizations with the proper equipment are capable of disabling drones via the use of;


  • Manned Aerial Fighters

  • Surface/Ground to Air Missiles SAM/GTAM

  • Theoretical Aerial Mines (Weather balloon perimeter grid equipped with impact detonated mines)

  • MANPADS/MPADS Shoulder launched SAM/GTAM

  • Anti-Drone Technology such as EW/ECM Data link Jammers

  • GPS/RF Jamming Technology for Micro-drones (You can easily build your own)

  • There has been some success in shooting down large fast flying US military drones – similar to the BAU - using small arms fire; AK47s, M16, Shotguns and Etc.

  • Russian Issued Sky Grabber Software for Signal Hacking

Knowing how to disable a predator drone sounds good but the reality is drone technology continues to advance and their weaknesses will be quickly addressed. Luckily, drone technology isn’t there yet and can be tricked with some rudimentary tactics.


Hiding from drones with clothing


The UAV Predator Drone is equipped with infrared scanners that are able to identify a target by its heat signature i.e. thermal radiation. Adam Harvey of Stealth Wear has designed counter surveillance clothing. These ‘Anti-Drone’ garments are designed with a metalized fabric that protects against thermal imaging surveillance.  Seen here →http://ahprojects.com/projects/stealth-wear


You can make your own counter-surveillance garments using a bit of ingenuity and a little investing. Materials such as metalized Mylar, Aluminum, Gold, Plexiglas and various types of pigment coatings will block IR (Infrared Radiation) Detection – a drone’s primary target identification system. You can also ready the usCrow How to Effectively Avoid FLIR and Aerial Detection Article for further details.


Hiding from drones with debris and the environment


Remember the end-scene from Predator, where Arnold Schwarzenegger covered his body with mud to avoid being detected by the alien predator that was using IR Detection? Now Americans citizens are utilizing the same method in real life. People across the country are covering their vehicles and habitats with mud, applying leaves and other foliage that matches the topography and blending in. Mud will block IR to a certain degree but it has it’s limitations due to the nature of infrared radiation. However, this method will hide your vehicle and home from drones using Non-IR standard camera viewing modes. Drones are built to hover, and their cameras are often taking fixed-viewpoint shots for long periods of time, or switching angles at particular intervals. A car traveling across the drone camera’s field of vision will do so for a brief period of time before disappearing, so a crude disguise has merit.


Other ways to avoid drone detection


In Timbuktu, a drone evasion tip sheet has been discovered. This tip sheet was written by Muslim extremist Al-Qaeda operatives who have been targeted by US Armed Forces with Predator Drones. This tip sheet illustrates several mundane methods employed by the insurgents that include using reflective glass or Plexiglas on roof/car tops, hiding under trees, underneath dense concrete structures, affixing woven reed mats to vehicles, and using counter-surveillance techniques such as; using mannequins, dolls, and staged equipment to trick drone operators. With the primary focus being placed upon visual camouflage and evasion, these techniques warrant merit. However, if your location has been identified and a strike package has been authorized, there is no real defense other than a solid prayer.


Do you have drone evasion tips? Comment below and help your community. The time is quickly approaching where lines will be drawn in the sand and you will be forced to choose between a life on your knees or death on your feet.


http://uscrow.org/2013/03/24/how-to-hide-from-predator-drones-uav-unmanned-aerial-vehicles-survival-guide/






How to hide from Predator Drones UAV – Unmanned Aerial Vehicles Survival Guide

Wednesday, September 18, 2013

Journalists Guide To Firearm Identification



What an elegant demonstration of hysterical ignorance.


This makes the NBC re-enactment animation which showed the guy holding a AR equipped with a M203 (grenade launcher) this morning even more hilarious.


Anyhow:


Did you ever wonder why domesticated dogs make such excellent herders?


It’s because of the simple fact that sheep cannot tell the difference between a wolf and a sheepdog. Maybe its because they’re stubborn, maybe its because they’re stupid.


So, in review:


Media Firearm Guide

Media Firearm Guide



MEDS: Navy Yard gunman was treated by US for serious mental illness...
Sought help weeks before shooting...
Navy had not declared mentally unfit...
KNEW IN 2007...
DC mayor blames "sequester"...
Father: "They Could"ve Stopped It" If They"d Had Ammo...
Politicians, media mischaracterize gun...
NYT "AR-15"...





WHAT REALLY HAPPENED



Journalists Guide To Firearm Identification

Tuesday, September 10, 2013

A Viewer"s Guide To Obama"s Syria Speech





President Obama walks along the West Wing Colonnade towards the Oval Office of the White House on Tuesday.



Pablo Martinez Monsivais/AP

President Obama walks along the West Wing Colonnade towards the Oval Office of the White House on Tuesday.



President Obama walks along the West Wing Colonnade towards the Oval Office of the White House on Tuesday.


Pablo Martinez Monsivais/AP



If ever a speech seemed to be President Obama’s last, best chance to win public and congressional support for his plan to launch military strikes against Syria, it’s his prime-time Tuesday talk to the nation.


With polls indicating that 60 percent of Americans oppose action against Syria for using sarin gas, and congressional approval looking ever more like a long shot, Obama’s speech is a high-stakes endeavor.


What can viewers expect to hear in the speech? It’s likely they’ve already heard most of the complicated case that Obama and other administration officials have made in recent weeks — though there’s the new twist of a Russian proposal that Syria put its chemical weapons under international supervision.


That latest turn of events is already rippling through the U.S. debate.


Still, the White House has indicated every intention to seek congressional approval for military action. White House deputy national security adviser Tony Blinken essentially laid out the main points at a briefing Monday.


They boil down to these ten words or phrases: Congressional authorization; intel; violated international norms; U.S. laws; national interest; U.S. credibility; a political solution; the new Russian initiative; limited military action, and the risks of inaction.


That’s an undeniably long list of reasons for a U.S. attack on Syria, causing at least one writer to accuse the administration of the equivalent of throwing spaghetti on the wall to see what sticks.


Anyway, let’s move through the points the president will likely make in Tuesday’s big speech, lumping some of the related ones together in order to move through them more quickly.


Congressional authorization, U.S. credibility, U.S. laws and national interest — Obama will likely note that he sought to do the right thing by seeking congressional approval before any attack and that lawmakers should do the same, at least in his eyes, by granting approval.


With the decision to put the question before Congress, “it’s important that he emphasize to both Republicans and Democrats that the country’s prestige is on the line and that failing to deal with Syria would not only have enormous ramifications for our dealings with North Korea but Iran as well,” says Jim Manley, former press secretary to Senate Majority Leader Harry Reid, now with the Quinn Gillespie lobbying and communications firm.


The administration notes that Congress passed the Syria Accountability Act in 2003 partly as a response to Assad’s stockpiling of chemical weapons.


By crossing Obama’s “red line” against using them, Assad has now lowered the threshold for their use again, threatening regional U.S. allies like Turkey and Israel, and neighboring Lebanon, all of which run counter to U.S. interests.


Intel and violated international norms — Expect Obama to once again assert that intelligence is conclusive that the Syrian military used poison gas against civilians. It’s a level of reassurance necessitated by the nation’s experience of having invaded Iraq on the basis of bad intel.


Tom Perriello, a former Democratic congressman from Virginia who opposed the Iraq War but supports the proposed U.S. action against Syria, said the lawmakers he’s talked to are persuaded.


“The things I’ve heard fairly consistently are, people walk away convinced that the Assad regime committed these atrocities and that there are targets we could hit that would inflict meaningful strategic pain on the Assad regime without significant collateral damage,” said Perriello, president and CEO of the Center for American Progress Action Fund.


Thus, strong intel indicates Syria violated international norms — requiring a response. Obama will likely push this line hard.


“First, I think he’s got to explain why nearly a century ago the United States led the effort to make chemical weapons usage illegal because of the threat we believed it presented to our troops and to innocent civilians across the world,” said Perriello. “Second, I think he has to explain why there’s a value to us of deterring the use of chemical weapons even if it doesn’t solve the larger conflict. If you have cancer and you get shot in the leg you’re going to want medical attention to address the leg wound even as you continue to fight the cancer.”


Limited military action — Obama is a president who mostly appears to share the public’s war weariness. Which is why he will emphasize that military action against Syria isn’t like invading Iraq or Afghanistan.


“He will, of course, be emphasizing that the duration will be limited and he’ll be emphasizing that targeting will also be limited,” said Jim Leach, a former Republican congressman from Iowa who now teaches at the University of Iowa Law School.


While the president will likely make the point that it isn’t his intention to involve the U.S. in another country’s civil war, he has a knotty problem which his speech is unlikely to disentangle, Leach suggests.


“The obvious dilemma is once you intervene in a civil war you take sides,” said Leach, who for years was a senior Republican on the House International Relations Committee. “And so, is that something we should be doing? And if we should be doing it, how should we be doing it? And so he has a terrific challenge. I think it’s going to be a very tough sell. That doesn’t mean it can’t occur.”


A political solution, the Russian initiative and the risks of inaction — Expect Obama to repeat the administration’s position that no military solution exists and that Assad and his regime’s opponents will need to reach a political answer.


Meanwhile, the Russians, Syria’s long-time allies, added a new wrinkle to the situation when they seized on comments by Secretary of State John Kerry that U.S. military action could be avoided if Syrians placed their chemical weapons under international supervision.


In network interviews Monday, Obama held out the possibility that a way forward without U.S. strikes might be possible if the Russian proposal proved real.


That’s a big ‘if’ for some.


“The problem is nobody takes Russia seriously on this,” said Perriello. “If Russia’s willing to back up its word with any indication of something real, I think that would a positive thing. But I’m not holding my breath.”


Obama is likely to acknowledge concerns that there are risks, but also to argue that the risks of inaction outweigh action.


The problem is that so many of those who agree with Obama that Syria’s behavior was abhorrent aren’t willing to take the leap into U.S. military action with him.


“We all have strong feelings and I certainly have strong ones,” Leach said. “I would recommend caution.”


Still, “it’s really key that this be the type of speech that we can all respect, even though many people will differ,” Leach said.




News



A Viewer"s Guide To Obama"s Syria Speech

Saturday, September 7, 2013

The Longform Guide to Undercover Journalism


Cows awaiting slaughter
Cows awaiting slaughter at a slaughterhouse

Photo by Ed Wray/Getty Images





Every weekend, Longform shares a collection of great stories from its archive with Slate. For daily picks of new and classic nonfiction, check out Longform or follow @longform on Twitter. Have an iPad? Download Longform’s app to read the latest picks, plus features from 70 of the world’s best magazines, including Slate.




The Way of All Flesh
Ted Conover • Harper’s • May 2013




Undercover in an industrial slaughterhouse. (Conover recently discussed this piece, and the challenges of undercover reporting, on the Longform Podcast.)




“Carolina and I are not like most of the other inspectors. This becomes obvious as Herb, our immediate supervisor, sits us down to fill out paperwork. The regulars are putting on their white hard hats, grabbing the wide aluminum scabbards that hold their knives, and heading out onto the floor to begin the day. They are mostly white and mostly from the area around Schuyler, Nebraska, the town we sit at the edge of. I grew up in Colorado but arrived in Nebraska from my home in New York City, which strikes many here as odd. Carolina was born in Mexico, spent her childhood in California, came to Nebraska a few years ago, and became a U.S. citizen in the past year. Still, in certain ways she has more in common with our co-workers than I do, because she has worked in meat plants before—the JBS packinghouse in Grand Island, Nebraska, where she was a quality-assurance technician, and before that a kosher slaughterhouse in Hastings, Nebraska, where she worked on the line—which means she has experience with a knife. Which I do not. That experience, I will soon learn, counts for a lot.”




Confessions of a Car Salesman
Chandler Phillips • Edmunds • Jan 2001




Undercover at a dealership to learn the tricks of the trade, of which there are many.




“What the customer didn’t realize was that the poor car salesman or woman was not really the enemy. The real enemy was the manager sitting in the sales tower cracking the whip. Suppose for a moment a customer told us they were ‘only looking,’ and we said, ‘fine, take your time,’ and went back into the sales tower. Now we find ourselves looking up into the steely eyes of the sales manager.




“‘That’s your customer out there,’ the manager would say.




“‘But they said they’re only looking,’ I would answer.




“‘Only looking? You’re going to take that for an answer?’ Foam was beginning to form at the corners of the sales manager’s mouth. ‘What the hell kind of salesman are you? Of course they’re looking! They’re all only looking until they buy. You want them to go across the street and buy a car over there? Because they have real salesmen over there. Now go back out there and sell those people a car. And don’t let them leave until they buy or until you turn them over to your closer.’”




I Was a Warehouse Wage Slave
Mac McClelland • Mother Jones • March 2012




Undercover in the online-shipping industry.




“‘You look way too happy,’ an Amalgamated supervisor says to me. He has appeared next to me as I work, and in the silence of the vast warehouse, his presence catches me by surprise. His comment, even more so.




“I don’t really feel happy. By the fourth morning that I drag myself out of bed long before dawn, my self-pity has turned into actual concern. There’s a screaming pain running across the back of my shoulders. ‘You need to take 800 milligrams of Advil a day,’ a woman in her late 50s or early 60s advised me when we all congregated in the break room before work. When I arrived, I stashed my lunch on a bottom ledge of the cheap metal shelving lining the break room walls, then hesitated before walking away. I cursed myself. I forgot something in the bag, but there was no way to get at it without crouching or bending over, and any extra times of doing that today were times I couldn’t really afford. The unhappy-looking guy I always make a point of smiling at told me, as we were hustling to our stations, that this is actually the second time he’s worked here: A few weeks back he missed some time for doctors’ appointments when his arthritis flared up, and though he had notes for the absences, he was fired; he had to start the application process over again, which cost him an extra week and a half of work. ‘Zoom zoom! Pick it up! Pickers’ pace, guys!’ we were prodded this morning. Since we already felt like we were moving pretty fast, I’m quite dispirited, in fact.




“‘Well,’ the supervisor qualifies. ‘Just everybody else is usually really sad or mad by the time they’ve been working here this long.’




“It’s my 28th hour as an employee.”




Undercover in a women’s insane asylum. On an island. In 1887.




“‘Who are they?’ I asked of a patient near me.




 “‘They are considered the most violent on the island,’ she replied. ‘They are from the Lodge, the first building with the high steps.’ Some were yelling, some were cursing, others were singing or praying or preaching, as the fancy struck them, and they made up the most miserable collection of humanity I had ever seen. As the din of their passing faded in the distance there came another sight I can never forget:




“A long cable rope fastened to wide leather belts, and these belts locked around the waists of fifty-two women. At the end of the rope was a heavy iron cart, and in it two women–one nursing a sore foot, another screaming at some nurse, saying: ‘You beat me and I shall not forget it. You want to kill me,’ and then she would sob and cry. The women ‘on the rope,’ as the patients call it, were each busy on their individual freaks. Some were yelling all the while. One who had blue eyes saw me look at her, and she turned as far as she could, talking and smiling, with that terrible, horrifying look of absolute insanity stamped on her. The doctors might safely judge on her case. The horror of that sight to one who had never been near an insane person before, was something unspeakable.”




Undercover as a Juggalette.




“I have infinite shortcomings as a Juggalette, but here are my two main ones: I can’t say ‘titties’ with a straight face, even when my face is covered with clown makeup. And I do not have any desire ever to show my own titties to crowds of ravenous young men I do not know. Many women at the 12th annual Gathering of the Juggalos (though not, by any stretch, all of them) are content both to refer to their breasts as ‘titties’ and to show those titties to crowds of ravenous young men they do not know. At times, the reveal involves a monetary exchange. ‘Suck my titty for a dollar’ is a popular hustle, and one girl offers her titties for any purchase of multiple dollar shots from her bottle of tequila. But in general, no money is required. As I walk through a tent area in the early evening, an excited Juggalo runs up to a group of guys in front of us. He has a can of beer in each hand, a cigarette on his lip, and some news: ‘We’ve got three Juggalettes giving free hand jobs in a tent up here!’




The Things He Carried
Jeffrey Goldberg • Atlantic • November 2008




Undercover going through airport security.




“I could have ripped up these counterfeit boarding passes in the privacy of a toilet stall, but I chose not to, partly because this was the renowned Senator Larry Craig Memorial Wide-Stance Bathroom, and since the commencement of the Global War on Terror this particular bathroom has been patrolled by security officials trying to protect it from gay sex, and partly because I wanted to see whether my fellow passengers would report me to the TSA for acting suspiciously in a public bathroom. No one did, thus thwarting, yet again, my plans to get arrested, or at least be the recipient of a thorough sweating by the FBI, for dubious behavior in a large American airport. Suspicious that the measures put in place after the attacks of September 11 to prevent further such attacks are almost entirely for show—security theater is the term of art—I have for some time now been testing, in modest ways, their effectiveness. Because the TSA’s security regimen seems to be mainly thing-based—most of its 44,500 airport officers are assigned to truffle through carry-on bags for things like guns, bombs, three-ounce tubes of anthrax, Crest toothpaste, nail clippers, Snapple, and so on—I focused my efforts on bringing bad things through security in many different airports, primarily my home airport, Washington’s Reagan National, the one situated approximately 17 feet from the Pentagon, but also in Los Angeles, New York, Miami, Chicago, and at the Wilkes-Barre/Scranton International Airport (which is where I came closest to arousing at least a modest level of suspicion, receiving a symbolic pat-down—all frisks that avoid the sensitive regions are by definition symbolic—and one question about the presence of a Leatherman Multi-Tool in my pocket; said Leatherman was confiscated and is now, I hope, living with the loving family of a TSA employee). And because I have a fair amount of experience reporting on terrorists, and because terrorist groups produce large quantities of branded knickknacks, I’ve amassed an inspiring collection of al-Qaeda T-shirts, Islamic Jihad flags, Hezbollah videotapes, and inflatable Yasir Arafat dolls (really). All these things I’ve carried with me through airports across the country. I’ve also carried, at various times: pocketknives, matches from hotels in Beirut and Peshawar, dust masks, lengths of rope, cigarette lighters, nail clippers, eight-ounce tubes of toothpaste (in my front pocket), bottles of Fiji Water (which is foreign), and, of course, box cutters. I was selected for secondary screening four times—out of dozens of passages through security checkpoints—during this extended experiment. At one screening, I was relieved of a pair of nail clippers; during another, a can of shaving cream.”




The Master of Spin Boldak
Matthieu Aikins • Harper’s • December 2009




Undercover with Afghanistan’s drug-smuggling border police.




“‘Oh, Matthieu,’ he said mournfully. ‘You are a big problem.’ They had planned to avoid formalities by smuggling me across the border; now, because of the explosion, the guards would be on high alert. A few more of Sikander’s friends came over to the car, and as they began to discuss a plan, Jahanzeb turned to me occasionally to ask questions in English. Do you want to go back? Do you want to go across on a motorcycle? I didn’t want to go back—it had taken me weeks of hanging around Quetta to arrange the trip—so we decided that Sikander and Jahanzeb would go ahead and send for me later.




“After a few tense hours in Chaman, a white Corolla with a gold plastic armani air-freshener on its dashboard arrived for me. The driver, tall and clean-shaven with a gap-toothed smile, looked me over as we accelerated north. ‘Do you speak Pashto?’ he asked me. I shook my head. ‘Urdu?’




“‘I speak Persian,’ I offered in that language.




“‘Then just don’t say anything,’ he muttered in Dari, the Afghan dialect of Persian. He examined my half-Asian features and wiry beard, which together gave me the look of an Afghan from the north—an Uzbek or Hazara, perhaps—and then placed his red embroidered cap, a typical Pashtun accessory, on my head.




“At the checkpoint, cutting into a side lane, my driver wove, honked, and waved his way past the black-clad Pakistani and camouflage-clad Afghan guards. They waved back in recognition. We drove around the arch and onto a wide, rough-paved highway swirling with dust and traffic. ‘How are you, my dear?’ the driver asked in Dari, grinning widely. ‘This is Afghanistan!’




 Fast Times at Ridgemont High
Cameron Crowe • Playboy • September 1981




Undercover in high school.




“The strange saga of Mr. Hand had been passed down to Stacy Hamilton by her older brother Brad. Arnold Hand, Ridgemont’s U.S. history instructor, was one of those teachers. His was a special brand of eccentricity, the kind preserved only through California state seniority laws.  Mr. Hand had been at Ridgemont High for years, waging his highly theatrical battle against what he saw as the greatest threat to the youth of this land–truancy.




“Mr. Hand’s other favorite activity was hailing the virtues of the three-bell system. At Ridgemont, the short first bell meant a student had three minutes to prepare for the end of the class. The long second bell dismissed the class. Then there were exactly seven minutes—and Mr. Hand claimed that he personally fought the Education Center for those seven minutes—before the third and last attendance bell. If you did not have the ability to obey the three-bell system, Mr. Hand would say, then it was aloha time for you. You simply would not function in life.




“‘And functioning in life,’ Mr. Hand said grandly on that first morning, ‘is the hidden postulate of education.’”




Have a favorite piece that we missed? Leave the link in the comments or tweet it to @longform. For more great writing, check out Longform’s complete archive.




MySlate is a new tool that lets you track your favorite parts of Slate. You can follow authors and sections, track comment threads you’re interested in, and more.




Slate Articles



The Longform Guide to Undercover Journalism