The following article from the Bard of the American Redoubt, over at the Charles Carroll Society, is yet another example of the American Redoubt Network’s growth and maturity. It is also consistent with just some of the topics covered by Guerrillamerica during the ICAC (Intelligence Collection and Analysis Course) put on by Sam Culper. We all love our M4s (or whatever your preferred modern-day ‘sword’), but we’re fighting on different battlefields. In the new era of resistance against tyranny, the electronic battlefield is one that we MUST accept and adapt to. That is a fact that could, and very well may, lead to our demise if ignored. You have to choose the correct weapon to match the tactical situation. Do you go up against a Bradley with a Glock-21? Do you counter propaganda with a bayonet?
On the electronic battlefield, you use electronic weapons. Get use to that. Unless/until we’re faced with a ‘grid-down’ situation, the e-battlefield is part of the equation.
After learning more about the scope and breadth of dragnet automated surveillance activities by government and non-governmental entities which we have covered on this blog in articles such as DROPOUT JEEP Your Phone is Their Phone, and If it is Electronic it is Intercepted and Stored I have become motivated to share my energy and expertise. I believe I may have found out a way to volunteer my unique technical experience to the Liberty movement in general and the American Redoubt objective in particular (other they my daily musing and balmy personality). I am an “IT” guy by trade.
Because I believe in the Liberty movement, the American Redoubt cause including a man’s God-given right to speak privately and freely (associate) as well as the U.S. Constitution I will begin to host a series of articles here to help you upgrade your computer security. The goal of the project is to teach you how to be more secure, and much more importantly as anonymous as possible while using the Internet. The focus will be on anonymity, not necessarily security. There is not a lock that has been invented that cannot be picked. However you can communicate as securely and anonymously as possible. Hopefully this will eventually cumulate into something I am going to call the American Redoubt Darknet (ARD). This is obviously an expansion of John Jacob Schmidt over at Radio Free Redoubt American Redoubt Radio Operators Network (AmRRON) and the American Redoubt Network (ARN).
As JJS says the American Redoubt Network (ARN) consist of all people who support the American Redoubt movement. The American Redoubt are people who live in, or are moving to the American Redoubt for multiple reasons including political reasons. Everyone, in the ARN should be able to help out in whatever way they can to support other Redoubters in good times and bad. AmRRON is a network of HAM, CB, FRS/GMRS and MURS radio operators who are training to help God-fearing Liberty individuals in time of crisis with wireless radio communications.
I envision the American Redoubt Darknet (AmRD or ARD I have not decided) operators will be guys like me who know a thing or two about computers, IP networks and computer programming and want to volunteer our time and resources in allowing Redoubters to communicate more anonymously. In general this will be in setting up anonymous (and as secure as possible) AR resources on darknets such as The Onion Router and the Internet Invisibility Project to allow for email, chat and file transfer. With the Lord’s help we will build systems that can help Liberty groups and individuals in time of crisis with computer and network communications which are as secure and anonymous as possible. Simply put the AmRD operators are the American Redoubt computer network guys. We will help Redoubters communicate more securely and anonymously with each other in good times and in crisis. What I believe will be interesting for the AR computer guys to do is to help build, expand and secure anonymous IP communications now, so that in the future we may be able to leverage these in times of crisis.
But Bard, the grid will be down we will not have network of computers. Yes, I agree, if we have a complete grid-down situation what we are building will not be useful at that particular time. However there is something to think about. One, the grid is not down now. And second, there is no guarantee that the grid will “completely collapse” as in a solar flare, EMP or coordinated attacks across the nation. Like semi-functioning countries such as Mexico the grid may come up and down, be up in some places be down in others. And on the other side of an event, there may be a “rebuilding phase” where the grid and computer networks are coming back on. No matter if is now, a semi-functioning grid or during a rebuilding phase it may be very useful for as many people as possible, to already know how to use computer networks as securely and anonymously as possible. One other thing BTW, you can use computer networks through HAM radios. We can call an anonymous and secure as possible network of computers a “darknet.”
“A darknet is anonymizing network where connections are made only between trusted peers (or friends in this case redoubters) using non-standard protocols and ports.” The primary purpose of the darknet is to make communications anonymous, not necessarily secure. This is critical for you to understand, the objective is anonymity, not necessarily security. Basically we will implement technology and show you how to implement technology to allow various forms of communications between interested parties and make it very hard, if not impossible for people to prove beyond a reasonable doubt “you were the one communicating.” That is anonymity. The core objective is to let people talk to each other, perhaps not in a secure method, but in a method that leaves very little finger prints of who was actually talking.
Why not focus on security Bard? It is my opinion that it is very hard, if not impossible to secure communications from the “…larger adversaries…” which are in transit. You can make them work for it, but you should not trust electronic security, what we call communications security (COMSEC) to any program. At the same time I believe for a similar level of work, it may be more achievable to make your interactions on the Internet very hard to track. To use a fantasy cultural reference Think of the Lord of the Ring. Once the eye of sauron is focused on you, it is nearly impossible to shake, but it may be possible to avoid the eye of sauron gaze and sneak through mordor. That is what the Hobbits did, they were able to sneak through, because the eye of sauron cannot be everywhere all the time. Of course that means you don’t “beat drums and walk around in loud colors while trying to sneak pass the eye of sauron in evil mordor. That is what you are doing now electronically. Electronically each and everyone of you are beating drums, putting up signs saying “…I am a Christian, Liberty loving patriot, look at me.” That is not good for avoiding the gaze of sauron. Focusing on anonymity which may be achievable rather than security, which may not be achievable thus makes more sense. More bang for the buck. However we will touch on security, and include security. If there is someone out there who wants to focus on security ideas (mostly around PGP or the OpenPGP now called GnuPG project I would assume) please volunteer.
There are many reasons you may want to use the web, or communicate with each other anonymously. The basic reason I am going to spend a lot of time helping you is that you should be “secure” in your effects. I believe in every man’s God-given right to private and secure communications and the Fourth amendment to the constitution.