Saturday, February 10, 2018

Shooting Tips from SIG SAUER Academy


The Basics of Gun Handling

Keys to Pistol Shooting Success

Pistol Shooting Drill to Improve Accuracy

Handguns that are Best for Home Defense 

Drawing a Pistol in a Car 

Pistol Shooting Drill: Shooting on the Move; Accurately 

Shooting While Moving: Practical Applications 

Tactical Tip: Working with Doors and Corners

Pistol Drill: Slide Lock Reload and Shooting on the Move

Ankle Holsters for Concealed Carry 

Pistol Draws 

Proper Pistol Fit 

Appendix Concealed Carry 

Close Quarter Pistol: Keeping Your Gun in the Fight 

Tactical Tip: Dry Practice 

Tactical Reload 

Performing a Status Check 

Proper Gun Belt


 

Shoot First & Shoot Last

 

Shoot First & Shoot Last
A Real-World Guide to Pistol Craft
by: Orlando Wilson | Risks Incorporated


The book is a no-nonsense guide to the application of pistols for self-defense and tactical operations. The contents of this book are applicable for novices and experienced shooters. Novice shooters will gain a solid foundation for defensive shooting, and experienced shooters will learn unconventional strategies that will give them the advantage in hostile situations. You will find simple, proven, and effective training techniques which dispel many myths concerning the tactical use of pistols.

It’s in PDF format, 130 pages and 8.5 MB and you can download directly @
https://docs.wixstatic.com/ugd/e53bac_391d7c2edb0d4363bfdd028470fc01e4.pdf

Friday, February 9, 2018

Woman Kidnapped and Tortured in Marblemount, WA


According to Skagit Breaking NewsA 66-year old Marblemount man [Jean Robert Streitler Jr.] has been arrested and booked into the Skagit County [WA] Community Justice Center  for Suspicion of 1st Degree Kidnapping, 1st Degree Rape, Four counts of Assault 2nd Degree, one count of Assault 1st Degree, Felony Harassment with Threats to Kill, Unlawful Possession of a Firearm 1st Degree and Possession of a stolen firearm. Charges that he held a woman against her will for three days, repeatedly torturing, raping and threatening to kill her.

Court documents state that Streitler forced the woman to strip naked and lay on the floor of his motorhome.  Streitler then handcuffed the woman’s hands above her head and used rope to tie her legs to a sink and couch  in the motorhome. He then spent the next 36 hours physically assaulting the victim. Streitler repeatedly kicked the woman in the thighs and groin area, leaving severe bruises. He then heated a butcher knife on the stove and held it to the inside of the woman’s thighs, and outside of her groin, causing burns.  Streitler then held the knife to the woman’s throat and asked her "Can you feel that? You don’t know what pain is, but you’re going to."  The woman told Detectives that Streitler then used a pair of pliers and twisted her nipples causing severe abrasions.  Streitler continued to torture  his victim by using  a torch to burn her groin area. He then cut her abdomen and legs with a knife and used scissors to cut her hair over and over again.

The victim told Detectives that on the morning of January 20th, Streitler had removed the handcuffs from the cabinets but left them attached to her arm.  Streitler told the victim to get dressed and threw some pajama pants at her.  He told her he was now going to kill her and her family.  The victim made a daring escape when Streitler had his back turned and she ran out of the motorhome. Streitler chased her but she was able to flag down a passing vehicle for help.  When Streitler saw the victim with the passing car he returned to his motorhome and fled the scene in a vehicle.

The strength of the victim to survive these heinous crimes, and her courage to escape this vicious criminal when the chance arouse can only be commended. I don't wish to diminish the strength and courage of the victim of these crimes in anyway, but it must also be noted that her survival was only by chance. Had her attacker not turned his back while she was unbound and had she not been able to run and flag down a passing car, it is very likely that she would have suffered further violence, torture, and a very painful death.

It is with the above heinous crimes clearly in mind, they we consider whether such a thing could happen to anyone of us. Do you practice personal security to help mitigate the risk of violent attack? Have you seriously thought about how you would deal with a violent attack and kidnapping.

In the past I have discussed Anti-Kidnapping Techniques here in the blog.

Your best chance of thwarting a kidnapping attempt is in the first few seconds. You must do everything you can to fight off your assailant. Forget about compliance and non-resistance, hoping that your abductor won't harm you. Fight dirtily and aggressively. Go for the eyes, the neck, the genitals. Shout at the top of your voice. Do not be taken quietly. Do not be a soft target. You have a good chance of scaring off your abductor or escaping if your response is unexpectedly violent.


Be armed, always! Make your attacker advance through a wall of bullets. Someday someone may kill you with your own gun, but he's going have to beat you to death with it, because it's going to be empty. According to U.S. Bureau of Justice Statistics data, having a firearm and being able to use it in a defensive situation is the most effective means of avoiding injury (more so even than offering no resistance) and thwarting completion of violent crime, such as robbery or assault. In general, resisting violent crime is far more likely to help than to hurt, and this is especially true if your attacker attempts to take you hostage.


If you just can't or won't carry a firearm for your personal protection; then always carry a knife. In his book All-In Fighting, W.E. Fairbairn wrote: "The knife in close-quarter fighting is the most deadly weapon to have to contend with. It is admitted by recognized authorities that for an entirely unarmed man there is no certain defense against a knife." The knife, in trained hands, can be a very effective and deadly means of personal protection. Yet, stabbing a man to death is an exercise in extreme violence. It is violent and sudden and what the body does in its final moments will shock you...maybe, if you haven't gotten your mind right about such matters.


Finally, develop the habit of situational awareness. By being alert you prepare yourself so that no attacker will likely take you off guard. You’ll see it coming. And with a proper mindset and a good set of quality close combat skills honed and ready to be called upon, you are most unlikely to be successfully victimized. The garbage that preys upon others, deliberately endeavors to pick victims that are not alert; persons who are distracted and who will  never see them coming in the first place. Look alert, be aware, and act like you’re paying attention to whoever is near you, and the odds of being attacked are greatly reduced. Not eliminated entirely, but reduced. And if you are situationally aware, you’ll be set to deal with any attack that some gutter filth initiates. (Bradley J. Steiner, Sword & Pen, January 2018)

Thursday, February 8, 2018

Photography and the Law


Bruce Schneier, an internationally renowned security expert, made the following comments about the threats we face from photography:

"What is it with photographers these days? Are they really all terrorists, or does everyone just think they are?

Since 9/11, there has been an increasing war on photography. Photographers have been harassed, questioned, detained, arrested or worse, and declared to be unwelcome. We’ve been repeatedly told to watch out for photographers, especially suspicious ones. Clearly any terrorist is going to first photograph his target, so vigilance is required.

Except that it’s nonsense. The 9/11 terrorists didn’t photograph anything. Nor did the London transport bombers, the Madrid subway bombers, or the liquid bombers arrested in 2006. Timothy McVeigh didn’t photograph the Oklahoma City Federal Building. The Unabomber didn’t photograph anything, neither did the shoe-bomber Richard Reid. Photographs aren’t being found amongst the papers of Palestinian suicide bombers. The IRA wasn’t known for its photography. Even those manufactured terrorist plots that the US Government likes to talk about - the Ft. Dix terrorists, the JFK airport bombers, the Miami 7, the Lakawanna 6 - no photography.

Given that real terrorists, and even wannabe terrorists, don’t seem to photograph anything, why is it such pervasive conventional wisdom that terrorists photograph their targets? Why are out fears so great that we have no choice but to be suspicious of any photographer?

Because it's a movie-plot threat.

A movie-plot threat is a specific threat, vivid in our minds like the plot of a movie. You remember them from the months after the 9/11 attacks: anthrax spread from crop dusters, a contaminated milk supply, terrorist scuba divers armed with almanacs. Our imaginations run wild with detailed and specific threats, from the news, and from actual movies and television shows. These movie plots resonate in our minds and in the minds of others we talk to. And many of us get scared.

Terrorists taking pictures is a quintessential detail in any good movie. Of course, it makes sense that terrorists will take pictures of their targets. They have to do reconnaissance, don't they? We need 45 minutes of television action before the actual terrorist attack -- 90 minutes if it's a movie -- and a photography scene is just perfect. It's our movie-plot terrorists that are photographers, even if the real-world ones are not." (Bruce Schneier, "Carry On" pp. 43-44)

If we can’t identify a terrorist threat associated with photography, is there some other limitation that should be placed on an individual’s ability to photograph that which is visible from a public venue?

A question that is frequently asked is whether it is illegal to photograph the police.

According to the United States Department of Justice (DOJ) (2013), "Statement of Interest of the United States, Garcia v. Montgomery County, Maryland", the First Amendment protects the rights of individuals who peacefully photograph police officers in the performance of their duties on a public street.  This First Amendment protection extends to the public at large and is not limited to the news media or others performing some type of official or job related function.  The DOJ also stated that the Fourth Amendment protected individuals from having their cameras or film seized by police officers without first obtaining a warrant or other due process.  The DOJ also expressed concern over secondary charges being titled against individuals who photograph the police, saying:

The United States is concerned that discretionary charges, such as disorderly conduct, loitering, disturbing the peace, and resisting arrest, are all too easily used to curtail expressive conduct or retaliate against individuals for exercising their First Amendment rights.  The United States believes that courts should view such charges skeptically to ensure that individuals’ First Amendment rights are protected. Core First Amendment conduct, such as recording a police officer performing duties on a public street, cannot be the sole basis for such charges.  
 
The DOJ makes it very clear that they believe that photographing police in a public venue is a constitutionally protected right.

What about photographing Federal Buildings?

The Department of Homeland Security’s Federal Protective Service (FPS) Threat Management Division (2010) stated in a bulletin to it personnel, as part of an agreement settling a lawsuit (Antonio Musumeci v. United States Department of Homeland Security, et.al. 10 Civ 3370 (RJH)) filed by the New York Civil Liberties Union:

For properties under the protective jurisdiction of FPS, there are currently no general security regulations prohibiting exterior photography of any federally owned or leased building... Furthermore, it is important to understand that this regulation [41 CFR, Section 102-74.420] does not prohibit photography by individuals of the exterior of federally owned or leased facilities from publically accessible spaces such as streets, sidewalks, parks and plazas... Therefore, absent reasonable suspicion or probable cause, law enforcement and security personnel must allow individuals to photograph the exterior of federally owned or leased facilities from publicly accessible spaces. 

And state laws say much the same thing...

The New York City Police Department (NYPD) (2009) in its operations order Investigation of Individuals Engaged in Suspicious Photography and Video Surveillance stated:

Members of the service are reminded that photography and the videotaping of public places, buildings, and structures are common activities within New York City... practically all such photography will have no connection to terrorism or unlawful conduct... Members of the service may not demand to view photographs taken by a person absent consent or exigent circumstances... In addition, a person who has taken pictures should not be directed to delete or destroy images stored within the device.

The NYPD has one of the most advanced counterterrorism departments in the world, and recognizes that "practically all photography will have no connection to terrorism or unlawful conduct".
   
What about photography on military installations?

While each military service may have different rules, and military Commanders may set specific regulations for photography on their facilities, the Army Public Affairs regulation is instructive. The bottom line for military facilities is that in public areas you need the permission of the Commander, and photography in restricted areas is strictly prohibited.

Army Regulation 360-1 "The Army Public Affairs Program" (25 May 2011)
5-33. Photographing military installations or equipment

a. Public access to Army installations is determined by local commands. Photographing historical buildings or areas of public interest for private use is generally permitted but also subject to approval by the local command.

b. Ground or aerial photographs, sketches, or graphic representations of classified military equipment or installations designated as restricted areas is punishable by law (18 USC 795). Reproducing, publishing, or selling this type of material is also punishable by law unless the photograph, sketch, or graphic representation indicates it has been reviewed and cleared for release by proper authority.

The American Civil Liberties Union (ACLU) has stated "Taking photographs of things that are plainly visible from public spaces is a constitutional right - and that includes federal buildings, transportation facilities, and police and other government officials carrying out their duties." The ACLU has provided a Know Your Rights Guide for Protestors & Photographers.

Stephen L. Haynes has also written a very informative paper Controlling Photography in (and of) Private Places that will aid you in understanding photography and the law.

Of course, while you have an absolute right to take photography in a public venue, this right does not necessarily extend to private property. Private property owners my limit some types conduct by individuals on their property, and even while standing in a public venue, where you have the right to take photographs (yes, you can photograph private property that is visible from a public venue), you should consider that:

  • Extending a camera over a fence may be a trespass.
  • Flying over a property for the purpose of taking photos may be a trespass.
  • "No Trespassing" signs are not required in order to establish a space as private.
  • You do not have the right to photograph someone in an area in which they have a reasonable expectation of privacy, such as their home, medical facilities, etc. If you take photos of people in such situations with your 200-400mm zoom lens, be prepared to be accused of violating their privacy.
  • Whether a photograph or video was taken legally depends on the location where it was taken, as well as the photographer's right to be on that property.


Wednesday, February 7, 2018

America's Surveillance State


Regardless of whether we support government surveillance programs or oppose them, I believe that it is important that we understand them. A 2017, six-part documentary America's Surveillance State is available on YouTube at the following links, and in other places such as Amazon Prime Video.

https://www.youtube.com/watch?v=NI1NdigJHP0

https://www.youtube.com/watch?v=ZodPWWJmj0I

This documentary series helps you understand surveillance in the United States.

In addition, in a February 6, 2018 article by the Electronic Frontier Foundation we read about a growing trend of companies exercising their right to judicial review when presented with National Security Letters and gag orders.

The list of companies who exercise their right to ask for judicial review when handed national security letter gag orders from the FBI is growing. Last week, the communications platform Twilio posted two NSLs after the FBI backed down from its gag orders. As Twilio’s accompanying blog post documents stated, the FBI simply couldn’t or didn’t want to justify its nondisclosure requirements in court. This might be the starkest public example yet of why courts should be involved in reviewing NSL gag orders in all cases.

A process referred to as "reciprocal notice" gives technology companies a right to request judicial review of the gag orders accompanying NSLs. When a company invokes the reciprocal notice process, the government is required to bring the gag order before a judge within 30 days. The judge then reviews the gag order and either approves, modifies, or invalidates it. The company can appear in that proceeding to argue its case, but is not required to do so.

Under the law, reciprocal notice is just an option. It’s no substitute for the full range of First Amendment protections against improper prior restraints, let alone mandatory judicial review of NSL gags in all cases. Nevertheless, EFF encourages all providers to invoke reciprocal notice because it’s the best mechanism available to Internet companies to voice their objections to NSLs.

The issue of government mass surveillance, and the illegal collection of information about US Persons (and others) is something that should still concern us.

You may also want to read the Defense Privacy and Civil Liberties Office's "Introduction to the Privacy Act". Broadly stated, the purpose of the Privacy Act is to (1) balance the government’s need to maintain information about individuals with the right of individuals to be protected against unwarranted invasion of their privacy and (2) to limit the unnecessary collection of information about individuals.


Telegraph


In November 2016, Telegram introduced a blogging platform to go along with its popular messaging app. This blogging platform is called Telegraph (http://telegra.ph/), and it is quick, easy, and anonymous. 

To use Telegraph you just go to Telegra.ph, and start writing. Enter a title for your article, your name (or pseudonym), and add some content, embed a photo or video; and when you are finished just click the 'Publish' button.

Your article is immediately uploaded, and you are able to share it by copying its URL (link) and providing it to others. You could for example share content rich articles by posting the URLs to your Twitter feed. You can even edit an entry after it is posted, as long as your browser accepts cookies and you return to your blog entry using the same browser.

With Telegraph there is not a blog that you point to as your own, rather all articles are uploaded to the Telegram/Telegraph servers and you share an article by sharing its URL. You can claim articles as your own, by listing yourself as the author and openly sharing the links to what you have written, or you can write anonymously by using a pseudonym and accessing Telegraph through your VPN or thorough TOR. The anonymous nature of Telegraph also opens up opportunities for abuse, as anyone can type absolutely anything in the "name" field, potentially tricking people into believing an article has been written by someone else. Still, I believe that the advantages of Telegraph far outweigh any potential for abuse.

To see a brief blog entry made using Telegraph, visit this link http://telegra.ph/CoS-02-06

Tuesday, February 6, 2018

Safer Internet Day


February 6, 2018, is Safer Internet Day (SID), a worldwide event aimed at promoting the safe and positive use of digital technology for all users, especially children and teens. This year's SID theme - Create, Connect and Share Respect: A better Internet starts with you-encourages everyone to play their part in creating a better, safer, and more secure Internet.

Visit the Safer Internet Day website

Keeping Children Safe Online  

Dealing with Cyberbullies  

Rethink Cyber Safety Rules and the "Tech Talk" with Your Teens

New York Public Library - Internet Safety Tips for Children and Teens



Monday, February 5, 2018

Telegram is Back in the iOS App Store

Secure messaging app Telegram has now returned to the iOS App Store, after being temporarily removed by Apple. The apps were taken down by Apple, and Telegram CEO Pavel Durov confirmed on Twitter that the Telegram and Telegram X apps had been removed. Telegram X is a recently-released alternative Telegram client built in Swift, with higher-speed, slicker animations, themes, and more efficient battery use. The Android version of the Telegram app -- which has over 100 million downloads -- remained available to download from Google's Play app store, as did Telegram X. Telegram's secret chats use end-to-end encryption, leave no trace on the company's servers, support self-destructing messages, and don't allow forwarding. In addition, secret chats are not part of the Telegram cloud and can only be accessed on their devices of origin. Messages in Secret Chats use client-client encryption, while Cloud Chats use client-server/server-client encryption, and are stored encrypted in the Telegram Cloud.


Facebook Knows Everyone You've Met.


Behind the Facebook profile you’ve built for yourself is another one, a shadow profile, built from the inboxes and smartphones of other Facebook users. Contact information you’ve never given the network gets associated with your account, making it easier for Facebook to more completely map your social connections.

Most people understand that Facebook is tracking their preferences whenever they are logged-in. But, few realize they’re being tracked in other ways too, even when logged-out of Facebook completely.

You might be wondering why this even matters, and how it really impacts you personally. The easiest way to answer those questions is to point out all of those big data breaches you hear about almost daily. Hackers rarely waste time on individuals these days. They’ve got much bigger fish to fry. Large retailers or the databases where these third-party companies store the information they’ve gathered.

Last year Kashmir Hill wrote a very interesting article last year for Gizmodo about How Facebook Figures Out Everyone You've Ever Met. Kashmir's article details how Facebook connects you with people through the contact lists and address books of other people, and is worth reading to understand how you are tracked and connected with others by Facebook.

--

An interactive demonstration of risks from Facebook.


Sunday, February 4, 2018

ALPRS - You Are Being Tracked


ICE is about to start tracking license plates across the US. The Immigration and Customs Enforcement (ICE) agency has officially gained agency-wide access to a nationwide license plate recognition database, according to a contract finalized in January 2018. The system gives the agency access to billions of license plate records and new powers of real-time location tracking, raising significant concerns from civil libertarians.

ICE agents would be able to query that database in two ways. A historical search would turn up every place a given license plate has been spotted in the last five years, a detailed record of the target’s movements. That data could be used to find a given subject’s residence or even identify associates if a given car is regularly spotted in a specific parking lot.

ICE agents can also receive instantaneous email alerts whenever a new record of a particular plate is found - a system known internally as a "hot list."

Automatic license plate recognition systems (ALPRS) are not new. The ACLU expressed privacy concerns about ALPRS use in 2012.   The EFF reported in May 2013 that Automated License Plate Readers Threaten Our Privacy.

Companies such as Veil  produce Anti-Tracking ANPR/ALPR Countermeasures, but the overall effectiveness of these countermeasures is less than perfect.

The EFF has published a Guide to Law Enforcement Spying Technology where they discuss APLRS and similar technology used by law enforcement.