Saturday, February 24, 2018

Need Help? - Crisis Hotlines

 
 
There are 3 easy steps
 
1. Fill out a brief Self-Check Quiz, which takes about 10 minutes.
2. A VA Chat Responder will review it and leave a personal response for you on this secure website, usually within 10-15 minutes. If the volume is especially high, it may take up to 30 minutes. The Responder's note will offer options for follow-up if it's felt that could be helpful.
3. You decide what's next. You may enter the online Veterans Chat and continue talking with a Responder without identifying yourself. You may want to get a referral to see someone in person. Or, you can decide to do nothing further at this time. It's all up to you. No follow-up services will be provided unless you request them.
 
Protecting your privacy

You will not be asked to provide your name or any other information that identifies you.
You will be automatically assigned a unique identifying number called a "Reference Code" which will appear on the upper right-hand corner of your screen. Your Reference Code will also be provided on a page that you will see immediately after you submit the Self-Check Quiz. You will need to make a note of your Reference Code, because you'll need it to get the Responder's note to your Quiz.

Do you need help? Are you thinking about suicide, a victim of domestic violence, struggling with an addiction? National Hotlines will connect you to someone who will listen, and help connect you with resources you need in your local area. The first step in getting help is to simply pick up the phone and ask. You are not alone!

Suicide Prevention Lifeline - 1-800-273-TALK (8255)
The National Suicide Prevention Lifeline is a national network of local crisis centers that provides free and confidential emotional support to people in suicidal crisis or emotional distress 24 hours a day, 7 days a week.


National Domestic Violence Hotline - 1-800-799-SAFE (7233)
National Domestic Violence Hotline has been the vital link to safety for women, men, children and families affected by domestic violence. With the help of our dedicated advocates and staff, we respond to calls 24/7, 365 days a year.


National Sexual Assault Hotline 1-800-656-HOPE (4673)
The National Sexual Assault Hotline is available 24/7. You'll be connected to a trained staff member from a local sexual assault service provider in your area.


National Hotline for Crime Victims - 1-855-4-VICTIM (1-855-484-2846)
The Victim Connect Resource Center is a referral helpline where crime victims can learn about their rights and options confidentially and compassionately.


National Drug Helpline - 1-877-709-2389
The National Drug Helpline offers free, 24/7 drug and alcohol help to those struggling with addiction. Call the national hotline today to receive information regarding treatment and recovery.


Mental Health & Substance Abuse National Helpline - 1-800-662-HELP (4357)
SAMHSA’s National Helpline is a free, confidential, 24/7, 365-day-a-year treatment referral and information service for individuals and families facing mental and/or substance use disorders.

Warning Signs

Suicide

 

Domestic Violence

 

Workplace Violence

 
 
Signs Of A Dangerous Person

Difficulty getting along with others: Inappropriate conduct and outbursts - yelling at co-workers (profanities or threats), and passive aggressive conduct ("I'm not talking to you.").

Clinical paranoia:  They may not yet be diagnosed, but they think others are out to get them. "Every time I hear a noise I have to check to be sure someone is not there to hurt me or my family. - If someone showed up with a high-power rifle we would be sitting ducks."

Litigious nature: Filing false police reports and grievances is their way of virtually controlling others. Everything is blown out of proportion.

Victim attitudes: They never take responsibility for their behaviors, faults, mistakes or actions. They always blame others; it’s always someone else’s fault.

Controlling behaviors: Keeping secret / hidden files about co-workers or others they believe are "out to get them". Deliberately disrupting the work of others - deleting files being used by another employee.

Vindictive references: They say things like, "He will get his someday," or "What comes around goes around," or "One of these days I’ll have my say."
 

Who Watches the Watchmen?


Who Watches the Watchmen?
The Conflict Between National Security and Freedom of the Press
by: Gary Ross, National Intelligence University, Washington, DC, July 2011

Those who surrender true liberty to a false security defend nothing worth preserving, while those who abandon real security to an illusory liberty protect nothing worth safeguarding.

"Since the founding of this nation, the U.S. press has been committed to promoting democracy through an informed citizenry. From the "lone pamphleteers" of 1776 to major metropolitan newspaper editors of 2011, each has recognized the significance of disseminating essential information to the public. This includes publishing information concerning government actions conducted on behalf of its citizens as well as exposing corrupt or illegal activity committed by its elected representatives. This free flow of information allows individuals to remain engaged with their government."

An interesting book, available as a free download from the National Intelligence University.

There are certainly things that governments must do in secret to accomplish the functions of government - no one expects to see classified national defense information published on the front page of the New York Times.

At the same time, government secrecy can also be used to cover up illegal activity. When a government agency seeks to hide its actions from public view, by sealing court records, denying FOIA requests, and keeping secret / hidden files, one must ask just what type of official misconduct and wrong-doing they are trying to cover up!

Friday, February 23, 2018

Washington State Lawmakers Exempt Themselves from Public Records Law


When a government agency seeks to hide its actions from public view, by sealing court records, denying FOIA requests, and keeping secret / hidden files, one must ask just what type of official misconduct and wrong-doing they are trying to cover up!

OLYMPIA, Wash. (AP) - Washington state lawmakers have overwhelmingly approved legislation that will circumvent a recent court ruling that found they were fully subject to the state’s public disclosure laws. The measure retroactively removes the legislative branch from the state’s voter-approved Public Records Act so that lawmakers are able to attempt to shield records sought by a coalition of media groups, led by The Associated Press, who prevailed in court last month. The Legislature is appealing the Jan. 19 ruling of Thurston County Superior Court Judge Chris Lanese, who ruled state representatives and senators and their offices are fully subject to the same broad public disclosure requirements that cover other local and state elected officials and employees at state agencies.


The Evil Maid Attack


An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil maid attack is characterized by the attacker's ability to physically access the target multiple times without the owner's knowledge.

Besides giving this type of attack a very catchy name, Polish security researcher Joanna Rutkowska successfully demonstrated in 2009 that even full disk encryption (FDE) cannot be counted on to protect a laptop when an attacker has physically access the device. Since then, the name "evil maid" has caught on with security professionals and the label has been used in a general fashion to describe scenarios in which the attacker doesn't simply steal the device -- or access it once to clone the hard drive -- but instead, returns multiple times to wreak havoc.

Basically, the attack works like this:

Step 1: Attacker gains access to your shut-down computer and boots it from a separate volume. The attacker writes a hacked bootloader onto your system, then shuts it down.

Step 2: You boot your computer using the attacker's hacked bootloader, entering your encryption key. Once the disk is unlocked, the hacked bootloader does its mischief. It might install malware to capture your encryption key and send it over the Internet somewhere, or store it in some location on the disk to be retrieved later.

You can see why it's called the "evil maid" attack; a likely scenario is that you leave your encrypted computer in your hotel room when you go out to dinner, and the maid sneaks in and installs the hacked bootloader. The same maid could even sneak back the next night and erase any traces of her actions.

Defeating the Evil Maid

No security product on the market today can protect you if the underlying computer has been compromised by malware with root level administrative privileges. If someone has physical access to your computer, we assume that that person has complete access to everything on your computer.
Putting your data on a thumb drive and taking it with you doesn't work; when you return you're plugging your thumb into a corrupted machine.

That being said, there are some common sense defenses against the "Evil Maid":

The defenses include two-factor authentication: a token you don't leave in your hotel room for the maid to find and use. The maid could still corrupt the machine, but it's more work.

Setting a BIOS password to prevent your laptop from being booted with external media. Remember though that a BIOS password can be removed by clearing dip switches, jumpers, jumping BIOS, or replacing BIOS - and other techniques. Some people super-glue the screws that hold their laptop together. This prevents the case from being easily opened.

Have a secure locking case in which to store your laptop while it is unattended, such as PacSafe, or a Pelican Laptop Case.

The simplest measure may be to always keep your device with you instead of leaving it in a hotel room or other unattended location.


Joanna Rutkowska's Anti Evil Maid article (Sept 7, 2011) provides a more technical look at defense against the Evil Maid.

People who encrypt their hard drives, or partitions on their hard drives, have to realize that the encryption gives them less protection than they probably believe. It protects against someone confiscating or stealing their computer and then trying to get at the data. It does not protect against an attacker who has access to your computer over a period of time during which you use it, too.

Thursday, February 22, 2018

Anarchists, Activists, and Saboteurs


Are you worried about government agents keeping secret files about you? Are you concerned that government agents are violating the civil rights of thousands of Americans by conducting an intensive, invasive, and illegal intelligence-gathering operation against people who oppose current government policy? Do you believe that government employees would submit false reports to local law enforcement about you, reports to be used in harassment campaigns that includes preemptive arrests and physical attacks on peaceful demonstrations; reports aimed at neutralizing the activities of individuals and political organizations through a pattern of false arrests and detentions, attacks on homes and friendships, and attempting to impede people from peacefully assembling and demonstrating against the government, anywhere and at any time? Do you believe they are Spying on Democracy?

Most of us probably do not concern ourselves with such things. But there is a part of our society that sees these things as a very real threat. These individuals oppose what they see as the illegal actions of big government and the crimes of big business. This opposition may be through political activity, civil disobedience, or even violent direct action. An April 28, 2017 article, "So You Want to Protest: A Beginner's Guide" in the Seattle Weekly pointed out that "asking nicely for change doesn't always work. To be effective, protesters must sometimes force a crisis-that is, interrupt some vital piece of social machinery like a highway or place of business, so that leaders are unable to ignore their demands. The squeaky wheel gets the grease, as the saying goes."

The culture that opposes Big Brother and Big Business can be very well-organized, and these groups publish manuals and guides on security culture, resistance, and direct action. Some of these manuals and guides are available at the following links. This is only a small sample what can be found on-line, and this doesn’t take into account what else may be available on the "dark web". But reading what's here will give you some understanding of the culture and provide you leads to other resources.



An Activist's Guide to Information Security

Animal Liberation Front: Guide to Direct Action

Black Cat Sabotage Manual

CrimethInc


Ecodefense: A Field Guide to Monkeywrenching

Family Guardian

Frontline Defenders

If An Agent Knocks


Rage University

Rats! Your guide to protecting yourself against snitches, informers, informants, agents provocateurs, narcs, finks, and similar vermin. - Claire Wolfe

Resistance Manual

Revolutionary Resources

Rise Up


Ruckus Society

Sprout Distro

Tactical Technology Collective

Warrior Publications

If you are responsible for the security of a business likely to be targeted by these groups, or maybe you live in a city that sees regular civil disturbances, it would be of value to understand the mindset and the tactics of this part of our society and our communities. Are you a police officer, or a government agent? There is a sub-culture of society that opposes you simply because of your chosen profession. Understanding the tactics that these individuals may employ against you will contribute to your personal safety.

           

It is however essential that we recognize that Americans have constitutionally protected rights to assemble, speak, and petition the government. Potential criminality exhibited by certain members of a group does not negate the constitutional rights of the group itself or its law-abiding participants to exercise their individual liberties under the First Amendment to the U.S. Constitution.

Wednesday, February 21, 2018

Microsoft Office Encryption


MS Office allows you to protect documents (Word), spreadsheets (Excel), databases (Access), and presentations (PowerPoint) with a password. When MS Office products are protected, they are encrypted and a password is required to open and read them. The default encryption values for MS Office 2013 are AES (Advanced Encryption Standard), 128-bit key length, SHA1, and CBC (cipher block chaining).  This provides reasonably good security for the content of your products, but you must ensure that you are using a strong password. (The 40-bit key RC4 protection used in earlier versions of MS Office, 97-2003, can typically be bypassed with password hacking software.)

To add a password to an MS Office product, click on the ‘File Tab’, choose the ‘Info’ Menu, and then click on the ‘Protect Document’ (‘Protect Workbook’, etc.) Button, and choose "Encrypt with Password" from the drop-down menu. Add a password to the open dialog box, confirm the password, and now your MS Office product will require a password the next time it is opened.

While MS Office Encryption provides good security for personal use, you should be aware of a potential security vulnerability if you use MS Office on a network. This vulnerability is a Microsoft tool called DocRecrypt.

Network administrators can use Group Policy to push registry changes that associate a certificate with password-protected documents. This certificate information is embedded in the file header. Later, if the password is forgotten or lost, use the DocRecrypt command line tool and the private key to unlock the file and, optionally, assign a new password.

Now, DocRecrypt won't recover the password for an encrypted document before this policy was established on the network, but once it is installed any MS Office encrypted documents you create thereafter will be able to be decrypted using the DocRecrypt tool.

One way to defeat the DocRecrypt tool is to create an encrypted document outside of the network and e-mail it to yourself. DocRecrypt shouldn't be able to add a decryption header to an already encrypted document.

While there are certainly better encryption tools than MS Office, the password-to-open / encryption function available in MS Office adds an additional layer of security to your documents, spreadsheets, databases, and presentations that is certainly far better than having no security at all. Would I use MS Office encryption to protect my most sensitive documents? No, probably not. At least not as my only form of encryption. Do I use MS Office encryption as an additional layer of security? Yes! It will keep most individuals and many local level agencies from accessing your data - when used with a strong password.


Diplomatic and Consular Immunity

 
 
 
To combat the myths surrounding immunity, the U.S. Department of State has released a video companion to its publication: Diplomatic and Consular Immunity: Guidance for Law Enforcement and Judicial Authorities. This short video, entitled Diplomats and the Law: Dispelling the Myths shows dramatizations of three scenarios common to law enforcement officers and the very real consequences that diplomatic and consular personnel face, even after immunity may have prevented arrest and/or prosecution.

The produced video and a companion quiz consisting of 10 questions to test your knowledge can be found at http://www.state.gov/ofm/resource/ile/index.htm

The publication, Diplomatic and Consular Immunity: Guidance for Law Enforcement and Judicial Authorities can be found at http://www.state.gov/documents/organization/149734.pdf


NotSharingMyInfo Is No More


Sorry! NotSharingMyInfo is no more :-(

We'll try to keep forwarding mail for existing addresses for as long as possible, but it's unclear how long that will be, so it's best to stop using them ASAP.

F.A.Q.

Q: What is NotSharingMyInfo anyway?
A: NotSharingMyInfo was a free email forwarding service.

Q: How much longer will my @notsharingmy.info addresses last?
A: There's currently no plan to shut down forwarding for existing addresses, but please be advised that it can happen any time. It's best to switch now if you can.

Q: I am not receiving mail sent to my @notsharingmy.info address. Can you look into it?
A: Unfortunately not.

Q: Can I buy this website?
A: No.

Q: Can I cancel my @notsharingmy.info address?
A: Yes, you can cancel it.

Q: How can I contact you?
A: Email hello@notsharingmy.info


Tuesday, February 20, 2018

Private Disposable Telephone Numbers

 
Sometimes you may want to communicate with someone by telephone, but you may not be comfortable giving out your personal and private telephone number. Maybe you are signing up for an on-line account or service and need to receive a text message to complete your registration. Maybe you are selling an item on Craigslist or e-Bay and want to let potential buyers contact you, but don't want to put your personal telephone number out on the Internet. You might want to provide a telephone number in a developing social situation, but if things do work out do you want that person to have your real telephone number. There are many reasons why you might not want to disclose your personal telephone number, and this is where disposable telephone numbers come into play.

Some of the most popular apps for disposable telephone number are:

Sudo App – I wrote about Sudo App in December 2017 and use Sudo regularly. The only disadvantage I see with Sudo is that it is currently only available for iOS (Apple), and thus if you have an Android phone you can’t take advantage of Sudo’s great services. Sudo is free, and gives you nine (9) telephone numbers.

Hushed App – Available for both iOS and Android, Hushed plans start at $1.99 per month. Calls between Hushed numbers are free, so you could set up a calling circle with friends and family for free as long as everyone signed up for a Hushed number.

Burner App - Your Burner App numbers works as a forwarding service to your private cellular telephone number. Plans cost at $4.99 per month / per line. Burner gives you the choice of a subscription or a simple pay-as-you-go option.

Number Proxy - Based in Canada, Number Proxy works similar to other disposable telephone number services. To create a telephone number with Number Proxy you purchase credits using either Bitcoin or PayPal.


It may be that you need to just receive a text message to sign up for an account or on-line service. SMS Receive Free and Free Phone Number both receive text messages and post those received text message to their web-pages. The received text messages are visible to anyone looking at the site, so you wouldn’t want to receive sensitive information there, but to just receive an activation code these sites may be an option to avoid tying a registration to your personal cell-phone number. The downside to this type of text message receiving site is that the telephone numbers can get overloaded.

Disposable telephone numbers and text message receiving web-sites help you add layers of privacy to your personal life. It is one more thing that an adversary will need to overcome in order to find the "real you".


While not designed as a disposable telephone number, Google Voice can have useful applications to ensure that you can always be contacted by those who have this number.

Google Voice (Google's VOIP telephone service) was established in 2009 and is free for anyone to use. With Google Voice, users can obtain a single phone number to be used on all of their devices. No longer do you have to give out an office, cell and home number - with Google Voice, whenever your number is dialed it will ring each phone and device you sync to the service.

One of Google Voice’s major selling points is the ability to route all of your devices under just one single phone number. Upon creating a Google Voice account, you are provided with a dedicated Google Voice phone number. This new dedicated number can then be linked to your cell phone, house phone, work phone or any additional lines. Whenever someone calls your Google Voice number, it will ring every device linked to your account. You can of course also make outgoing calls from all of these devices as well, even including your computer. No matter which device you dial from, the receiver’s caller ID will see your new Google Voice number.

Since Google Voice numbers aren't listed in phone books or connected to physical addresses, they're difficult to trace. When you call contacts from your Google Voice number, it shows up on their caller ID, but standard phone traces don't reveal your identity. If law enforcement agencies become involved, Google provides them with your account information, including the IP address from which you created the account and placed calls. (Security Tip: Always connect through a VPN.)

A government agency can request your data from Google by providing a subpoena, court order or search warrant. However, Google claims to take users' privacy very seriously and doesn't give information to authorities unless the request passes a rigorous internal process. If authorities have requested your data from Google, you receive an email notifying you of the request. If Google finds a subpoena, court order or search warrant valid, it provides the government agency with specific account information, including your IP address, which can reveal your physical location.

If someone enters your Google Voice number in an online directory, such as White Pages, Switchboard, or AnyWho, the search returns the Bandwidth headquarters, the company that issues VoIP numbers to Google Voice users. Since Bandwidth has many headquarters across the country, your Google Voice area code determines which building the search finds on a map. Finding your location and identity from this information is impossible, especially since you can choose any area code for your Google Voice number.

Monday, February 19, 2018

How to Survive A School Shooting


Following the shooting at Marjory Stoneman Douglas High School in Parkland, Florida on February 14, 2018 the gun-control group "Everytown for Gun Safety" reported that there had been eighteen (18) school shootings in the United States since the beginning of the year.

This fake statistic was quickly debunked by web-sites like Snopes, and USA Today published an article No, there have not been 18 school shootings already this year on February 16, 2018 in which they stated "Fake stats like that make finding a solution to the real problem of gun violence, which has actually struck American schools at least six times this year, that much harder. Amping up fears, and muddying the search for fixes that can cut back the senseless violence, only undermines efforts to reconcile the real concerns of parents and the legitimate desire of civil rights advocates to protect the Bill of Rights. Everytown for Gun Safety, the gun-control advocacy group responsible for spreading this bogus statistic, should be ashamed of its blatant dishonesty."

As USA Today reported, the truth is that since the beginning of 2018, there have been six (6) school shootings in the United States. Now, I do not say just six school shootings, or only six school shootings, because even one school shooting is one too many, but it is important to have the facts as we search for solutions to violence in our schools, and on our streets.

Gun-control groups claim that the answer school violence (and other mass-shootings) is to somehow ban, or at least severely restrict, all firearms ownership. At the other end of the spectrum, we see memes suggesting that local governments should hire three or four armed veterans to protect every school. Military service, while certainly honorable, does not necessarily make one skilled with firearms (although all veterans have basic firearms familiarization). Nor does military service make one particularly qualified to assess this type of threat. Whether the fake reports are from Everytown for Gun Safety, or anyone else with a political or personal agenda, such reporting undermines the credibility of the organization, and impedes the search for solutions to actual threats of violence in our communities.
 
How to Survive A School (or Workplace) Shooting

According to Police Magazine "Department of Homeland Security research reveals that the average duration of an active shooter incident at a school is 12.5 minutes. In contrast, the average response time for law enforcement is 18 minutes." This means that on average the shooter will have fled the scene or committed suicide on scene before the arrival of law enforcement.

If we accept the Department of Homeland Security statistics as accurate, police are not going to be able to respond quickly enough to save you (your children) from an active shooter in a school.

To survive a school shooting you will need to escape the area without crossing the path of the shooter thus becoming a target, hide and avoid detection by the shooter for an average of 18 minutes until arrival of police, or if confronted and attacked by the shooter fight back – which means having the tools and skills to do so.


The Department of Homeland Security has published a guide on how to respond to an active shooter. In November 2017, I provided links to Active Shooter awareness resources, saying: “Active shooter situations are unpredictable and evolve quickly. Because active shooter situations are often over within 10 to 15 minutes, before law enforcement arrives on the scene, individuals must be prepared both mentally and physically to deal with an active shooter situation.”

wikiHow has a useful guide on How to Survive a School or Workplace Shooting, and I found the February 18, 2018, TownHall article 7 Simple Steps to Eliminate School Shootings Overnight to provide useful recommendations and observations.

Surviving An Active Shooter - LA County Sheriff (YouTube Video)

San Antonio Police Department-Civilian Response to Active Shooter (YouTube Video)



Some students are even beginning to carry backpacks with a bullet-resistant insert to help protect themselves in case of a school shooting. While I question the effectiveness of these backpacks - the ballistic panel will certainly stop some bullets, but when fleeing an active shooter students will be required to leave their personal items (i.e. the backpack) behind - you may find that this type of item fits into your personal threat model.

School shootings are different than mass-shootings in other places, because children may lack the maturity and understanding to quickly recognize and respond to a threat (this could be said of some adults as well). Sill, as children get older and become more mature it is important to talk with them about the possibility of an active shooter in their school and how to respond to that threat.

Do you know what the active shooter plan is at your children's school? Does the school even have a plan? Does the school conduct active shooter awareness training or drills?


There is no simple answer to school shootings. Recognizing that this threat is a possibility (no matter how small that possibility may actually be), and having a plan to respond is essential. Those plans must be made based on clearly defined facts, avoiding fake statistics and firearms hysteria intended to advance political and personal agendas.

Lt. Col. Dave Grossman, a Pulitzer Prize nominated author, West Point psychology professor, and one of the world’s foremost experts on human aggression and violence made the following recommendations to prevent and respond to school shootings, in Police One, back in May 2010:

1. Denial - Denial is the enemy and it has no survival value, said Grossman.

2. Deter - Put police officers in schools, because with just one officer assigned to a school, the probability of a mass murder in that school drops to almost zero.

3. Detect - We’re talking about plain old fashioned police work here. The ultimate achievement for law enforcement is the crime that didn’t happen, so giving teachers and administrators regular access to cops is paramount.

4. Delay - Various simple mechanisms can be used by teachers and cops to put time and distance between the killers and the kids.

     a. Ensure that the school/classroom have just a single point of entry. Simply locking the back door helps create a hard target.

     b. Conduct your active shooter drills within (and in partnership with) the schools in your city so teachers know how to respond, and know what it looks like when you do your response.

5. Destroy - Police officers and agencies should consider the following:

     a. Carry off duty. No one would tell a firefighter who has a fire extinguisher in his trunk that he’s crazy or paranoid.

     b. Equip every cop in America with a patrol rifle. One chief of police, upon getting rifles for all his officers once said, "If an active killer strikes in my town, the response time will be measured in feet per second."

     c. Put smoke grenades in the trunk of every cop car in America. Any infantryman who needs to attack across open terrain or perform a rescue under fire deploys a smoke grenade. A fire extinguisher will do a decent job in some cases, but a smoke grenade is designed to perform the function.

     d. Have a "go-to-war bag" filled with lots of loaded magazines and supplies for tactical combat casualty care.

     e. Use helicopters. Somewhere in your county you probably have one or more of the following: medevac, media, private, national guard, coast guard rotors.

     f. Employ the crew-served, continuous-feed, weapon you already have available to you (a fire hose) by integrating the fire service into your active shooter training. It is virtually impossible for a killer to put well-placed shots on target while also being blasted with water at 300 pounds per square inch.

     g. Armed citizens can help.  Think United 93. Whatever your personal take on gun control, it is all but certain that a killer set on killing is more likely to attack a target where the citizens are unarmed, rather than one where they are likely to encounter an armed citizen response.



Sunday, February 18, 2018

Postal Re-Mailing for Privacy


When you send a letter through the United States Postal Service (USPS) a postmark from the post office where it was mailed (or more likely the area postal processing center) is affixed to the letter, canceling the stamp and showing the general area where the letter was mailed.

While a postmark does not reveal the address of the sender of a letter, it does reveal the general area in which you live, or at least where you were when you mailed the letter. If you are trying to conceal your location, you will need to take steps to ensure that a postmark does not give you away.

As one re-mailing service says: "There are many legitimate reasons [that you might want to use a re-mailing service]. Maybe you are a whistleblower using your legal protection of anonymity to report something important while avoiding retaliation. Perhaps you're an absentee parent or estranged family member hoping to update a child or other relative without revealing your whereabouts. You may be a person trying to expand an online relationship with a personal letter and do not yet wish to reveal your physical location to your online friend."

The reasons for using a re-mailing service goes on:
  • Providing important information to someone anonymously
  • Privacy of your real location or address while travelling
  • Correspondence with friends or family without revealing your location
  • Get a letter to an ex-spouse without disclosing where you live
  • Report an illegal activity to law enforcement
and... many other reasons that may apply to your personal situation and privacy requirements.
 
There are postal re-mailing services that will re-mail your letters and packages for a fee of around $2.00 per letter and $5.00 per package.

It is interesting to note that the USPS also provides a simple re-mailing service for people who want a postmark as part of a special occasion or holiday. For example, if you would like a postmark from a town with a "romantic" name for Valentine’s Day, the USPS provides this service. The USPS says: "Post Offices with Valentine’s Day Names. Interested customers can write to these Post Offices for postmarks to keep or to share with friends.  Enclose a stamped, addressed card or letter in another envelope or box labeled "Valentine re-mailing" and address it to the postmaster of one of the towns listed below. Please allow enough time for postmarking, re-mailing, and delivery."

You don’t have to wait for Valentine’s Day, or some other holiday to use this re-mailing technique for privacy purposes. Although not the most common of hobbies, people do collect postmarks from different locations. Using the Valentine’s Day technique, you can have a letter re-mailed from any post office at any time. Just, enclose a stamped, addressed card or letter in another envelope and send it to the Post Master of the post office from where you would like it re-mailed. When the Post Master opens the outer envelope, he or she has the inner envelope which is properly addressed with the required postage affixed, and it must be entered into the mail as any other letter.

Sending a letter to the Post Master for re-mailing works well for sending letters, but for re-mailing of packages, as well as having other services related to re-mailing, you will need to work with a re-mailing service. A few postal re-mailing services are listed below.

Rapid Remailer
Radicarian LLC
25878 SE Hwy 19
Old Town, Florida 32680
http://www.rapidremailer.com/
$2.00 per letter
$5.00 per package

Chicago Re-mailing Service
2413 W. Algonquin Road, Suite 422
Algonquin, IL 60102
http://chicagoremailingservice.com
$2.00 per letter
$5.00 per package

Midwest Remailer
DDB Solns
PO Box 220
Harrison, OH 45030
http://midwestremailer.com/index.html
$2.00 per letter or three for $5.00

TTI Mail Services
Post Office Box 675
Occoquan, VA  22125-0675
https://www.snailmailforwarding.com
$2.00 per letter re-mailed from N. VA
$3.00 per letter re-mailed from Washington, DC

Rapid Remailers
c/o 9414 West 120th Terrace # 15
Overland Park, KS 66213
https://postmarkhere.com
$1.00 per letter
 
Receiving Mail Without Disclosing Your Address

Sending mail from an alternate location (having a letter re-mailed) is fairly easy, but how do you receive mail without disclosing your actual address? 

One way to do this is General Delivery mail.

According to the United States Postal Service web-site:

Get your mail even if you’re on the road, new to town, or between permanent addresses. Mail addressed to you at General Delivery will be held at the area’s main Post Office for up to 30 days. All you have to do is pick it up.

General Delivery is a great choice if you don’t have a permanent address. People can send you mail by using the town name and ZIP Code, like this...

JOHN DOE
GENERAL DELIVERY
ANYTOWN, NY 12345-9999


In medium to large cities with multiple ZIP Codes, you’ll want to make sure senders use the ZIP Code for the area’s main Post Office. The ZIP+4 extension 9999 indicates general delivery.

The advantage of General Delivery is that you don’t have to have a permanent or local address to use it. In fact, it is designed for people who don’t have a permanent address. When picking up General Delivery mail you will be asked to show ID that matches the name on the mail you are picking up. If you regularly receive General Delivery mail, the post office may require you to fill out  PS Form 1527 "Application for General Delivery Service", but there are no fees to pay for General Delivery. Whether you are asked to fill out the PS 1527 or not, you can receive mail by General Delivery without disclosing your real address to the sender. Normally only the main post office in an area will provide General Delivery service, but it's a simple matter to check with your local post master to find out where you can receive General Delivery mail.

I have previously written about using the Street Addressing option offered by some post offices when a 'street address' is required, and of course just having a PO Box at a post office adds a layer of privacy to your actual physical address.


Another option is to use a mail forwarding service that meets the needs of frequent travelers. Once such service is the Escapees RV Club - Mail Forwarding Service. With this type of service you can have a mailing address in a different state. The service receives and holds your mail, and then forwards it to you upon receiving your instruction to do so. Escapees RV Club is a commercial mail receiving agent (CMRA) and like many CMRA charge around $200 per year for their services. Still, as a way to conceal your physical location, and as a way to receive postal mail while traveling, this type of service may be worth the money.

If you want to receive packages without disclosing your address to the sender, both FedEx and UPS have hold for pick up options at any FedEx or UPS location respectively. When using a hold for pick up option it's important to know for sure what carrier will be delivering your package. You don't want to end up with a hold at FedEx location package addressed to your local UPS Store.

Combining a CMRA with a USPS street addressing option, or a hold at a FedEx or UPS location can add multiple layers of privacy around your true physical location. However, the more layers your mail must pass through, the longer it will take for you to receive it.