Grow Your Collection with the New ITS Modular Morale System

Modular Morale System

Our new ITS Modular Morale System represents an exciting leap forward in display panels for your morale items, including all types of patches, lapel pins, buttons, Military ribbons, cards and more!

This made in Texas MMS is a 12” x 18” panel made from 3/16” foam that’s bonded to an HDPE plastic backer before being covering with UBL soft loop fabric and stitched down. This creates a surface that you can press a pin into to hold your embroidered patches that might not have a hook backing to interface with the soft loop surface of the panel.

ITS_Modular_Morale_System_09

The UBL soft loop fabric wraps around to the back of each panel, creating a picture framed strip of soft loop to interface with our attachment method of two included 12” strips of 2” wide Velcro adhesive-backed hook. You can choose to permanently mount these hook strips by removing the plastic backer, or leave the backer intact and staple them to a wall for a non-permanent attachment.

By placing a hook strip offset on the edge of a panel, it can interface with another panel to grow your Modular Morale System as big as your imagination allows. Hang them vertically or horizontally, there’s no right or wrong way to use them!

Modular Morale System

Pick Up the New ITS Modular Morale System Here!

Posted in ITS Information | Tagged , , , , , , , , , , , , , | Leave a comment

Plan for Success: Using the CARVER Matrix and Red Teaming Your Plan

Red Teaming the Plan

One of the most important things you can do when you develop a plan is to do your best to ensure it survives Mr. Murphy. We’ve talked about this many times, but here’s a small brain dump of what Red Teaming your plan would look like. Please note that your mileage may vary depending on the plan.

Red Teaming a Plan

Once you have your plan in place, bring in your team and identify the risks, threats and vulnerabilities.

  • Risks are the the likelihood of being targeted by a given attack.
  • Threats are what could happen.
  • Vulnerabilities are the weaknesses that an adversary will exploit to make the attack successful.

Translate Your Plan

What could break the plan, how and by what?

  1. Identify the key aspects of the plan.
  2. Identify threats most likely to impact those parts of the plan.
  3. Determine the vulnerabilities that might make those threats real.

Rank by Importance

Start by listing the most important aspects of the plan, which are the parts that would cause it to fail if they don’t occur. Rank these by importance:

  • Critical: The plan will fail.
  • Essential: The plan might fail, but you can still run a contingency.
  • Non-Essential: Good to have, but it if doesn’t happen the plan will still succeed.

Write these on a whiteboard and make a table listing each one by critical ranking.

ID Threats

What can happen? When? What is most likely to happen? How? Write the questions and the answers next to each part identified. Give a probability rank to those threats:

  • High: This will most likely happen.
  • Medium: There is a chance of this happening, but we have mitigating controls.
  • Low: It will rarely happen.

You should have in front of you now a table with the most important parts of the plan, how critical they are and the threats to those parts marked by probability. You can already begin to see the parts that are most likely to fail and how important they are.

Red Teaming the Plan

The next step is to think about the vulnerabilities. Which of the threats identified above has the greatest likelihood of disrupting the plan? How? What’s the thing that can break and cause that threat to become real? Things like equipment failure due to batteries, weather causing traffic and delaying execution, etc.

After adding these to your table, you should have a clear picture of the things that could go wrong with the plan. Now focus on the critical parts and high probability threats. Discard anything else for now. List the possible solutions for those and add them to the plan.

When you’re done, bring in the 10th man. Meaning an external party that hasn’t been part of the process and show them the entire plan. After going through this feedback, you’re now ready.

Remember Rule 29: If you’re happy with your security, so are the bad guys.

Red Teaming the Plan

Carver Matrix

CARVER is an acronym that stands for Criticality, Accessibility, Recuperability, Vulnerability, Effect and Recognizability. It’s a system used by Special Forces to assess the targets and see which one needs to be addressed first. This is included to help with the Red Teams assessment above. Below you’ll find what each component means in terms of information security:

Criticality: The target value. How vital is this to the overall organization? A target is critical when its compromise or destruction (failure to provide any of the CIA triad components) has a highly significant impact in the overall organization.

Accessibility: How easily can I reach the target? What are the defenses? Do I need an insider? Is the target computer off the Internet?

Recuperability: How long will it take for the organization to replace, repair, or bypass the destruction or damage caused to the target? Once the compromise is found, how long will it take for the system to recuperate from it?

Vulnerability: What is the degree of knowledge needed to exploit the target? Can I use known exploits or should I invest in new, possible 0-day exploits?

Effect: What’s the impact of the attack on the organization? Similar to the first point (Criticality) this point should also analyse possible reactions from the organization.

Recognizability: Can I identify the target as such? How easy is to recognize that a specific system / network / device is the target and not a security countermeasure.

How to use the CARVER Matrix

Wikipedia states: Employing the Carver matrix can help identify targets that are vulnerable to attack and for defensive purposes, the Carver matrix can indicate “High Risk” targets that require additional security assets allotted to them to prevent the degradation of said assets via enemy assault or terrorist action.

This is also accurate in the world of information security. How do we use the CARVER Matrix? Write down the targets in a table, on top of that table write the components of CARVER, then rank each target on each component with values from 1 to 5, 5 being the highest priority or, in our case, the highest value:

Target   C   A   R   V   E   R Total
SQL Server 3 2 4 2 5 5 21
Mail Server 5 5 2 3 3 5 23
CEO’s workstation 5 1 2 5 5 1 11

This example shows that within our fictitious network, the most vulnerable part is the Mail Server (total score 23). Why? Let’s answer that from the CARVER perspective:

Criticality: In this organization the mail server is vital to daily work, it gets a 5.

Accessibility: The mail server is easily accessible from the internet; there are some defenses, but they’re trivial and the score is 5.

Recuperability: Since the organization’s IT personnel know that the mail server might be vulnerable, they make a backup every day. In the event of something going wrong, there will be some downtime and possibly some lost messages, but the backup will be up and running soon. The score then for Recuperability is 2.

Vulnerability: The attacker doesn’t have to be an expert or have a high degree of knowledge to attack the mail server, however some degree of knowledge and proficiency is required (a script kiddy cannot do this) so it gets a 3.

Effect: We know the mail is critical, but what happens if it gets compromised? The organization will be down for some time, however since a backup is in place, hopefully no one will panic. The score is 3.

Recognizability: It is trivial to recognize a mail server as such, so it gets a 5.

Beyond the fact that the email server’s score is 23, the matrix shows that since it’s a critical part of the organization (C=5) and the knowledge required to penetrate this server is of medium to low (V=3), it should be secured first.

Try running several analyses on different assets in a network. You’ll see patterns begin to appear and it’ll be clear what parts of the networks are the most vulnerable.

Editor-in-Chief’s Note: U. Fridman is a senior information security consultant that specializes in detection of information security threats and response to security incidents. His background includes extensive experience in red team activities and management, information warfare, counter cyber-terrorism, industrial espionage, forensics analysis and other security services.

Posted in Security | Tagged , , , , , , , , , , , , , , | Leave a comment

Could Palcohol Powdered Alcohol be an Alternative for Backpacking Stove Fuel?

Palcohol

There’s a new product coming to the market this summer called Palcohol, which is powdered alcohol capable of being rehydrated with a little water to bring it back to its original state.

Palcohol’s original intent is to be consumed and comes in different flavors like Vodka, Rum, Cosmopolitan, Powderita and Lemon Drop. While not even on the market yet, Palcohol has become controversial to some who want the FDA to ban it for reasons like the potential to snort it, sneak it into places easily, spike someone’s drink and it being easily obtainable by kids.

The creator, Mark Phillips, does a good job to counter these concerns in the video below and also brings to light some interesting alternative uses for his invention. While I’m not going to address all the feedback Phillips brings up in the video, the main thing is that Palcohol will be taxed and regulated like regular alcohol. That being said, a lot of the concerns seem unfounded, especially considering that the volume of powdered alcohol is nearly the same as the volume of a shot of alcohol.

The potential that Palcohol brings to the outdoors community is very interesting. First off, I enjoy a good drink at the end of a day on the trail like a lot of you and I can certainly see the benefits of not having to carry the weight of liquid or worry about spills inside a backpack.

If you watched the video above, you’re hopefully as excited as I am by this invention, especially the industrial formulation that can potentially be used as an antiseptic to send to remote locations or areas affected by natural disasters where weight constraints for shipping are a concern.

There’s also the potential of Palcohol developing a fuel formula to use in backpacking and Alcohol Stoves, to cut down on weight for backpackers and the Military. Airlines are also interested in Palcohol to potentially save millions in fuel costs when transporting alcoholic beverages, due to Palcohol having just 1/3 of the weight when compared to liquid.

What’s Next?

In all, Palcohol seems to be an interesting leap forward and I’m very excited to see what develops. As mentioned, the concerns that have been brought up seem a bit unfounded, but with all game changing ideas, there’s bound to be some push back from lobbyists and initial reactions from the public.

I hope Palcohol can move past this and be able to bring some exciting evolution to the market. For more information and to keep up with news about it’s release, visit the Palcohol Website.

Posted in News | Tagged , , , , | 4 Comments

Ridiculous Dialogue Podcast: Episode 23

ridiculous-dialogue-episode-23-main

Episode 23

Bryan’s good friend Mike DeLoach joins Rob and Kelly today on Ridiculous Dialogue #23. Mike D. delves deep into his embarrassing moments where this week’s title originates. We also put Kelly on the spot about her anticipation fear.

Along with the group sharing their embarrassing moments, we also discuss pranks in the good old days, which coincidentally are also when Kelly was in pageants as a little girl.

If you’d like to get a question or comment on the air, be sure to use the hashtag #ridiculousdialogue on Twitter! Thanks for listening and be sure to pick up your official Ridiculous Dialogue Podcast T-Shirt.

cast-of-characters-episode-23

Ridiculous Dialogue was created to share the banter that takes place at Imminent Threat Solutions on a daily basis. It’s us; candid, unedited and talking about everything from what movies we’re watching to the general geekiness that keeps us laughing here at ITS HQ.

While we generally keep the vibe in our articles PG rated, be warned, it may not be safe to blast over your speakers at work. We hope you enjoy the insight into ITS and who we are behind the scenes as a company; pull up a chair and tune in to Radio ITS.

Posted in Podcast | Tagged , , , , , , , , , | Leave a comment

What’s the Sport of Rucking and Why is Beer > Bananas?

GORUCK Kill That 5K

I’ve long been a fan and active participant in all that GORUCK has done to foster Rucking (moving with weight on your back in a rucksack AKA backpack) and share it with the world. However, I was intrigued when they recently started the discussion about it being a sport.

I hadn’t looked at it from that perspective, but they present some compelling information on why it’s just as much a sport as others. Through the acronym ART, (Active Resistance Training) they break it down to describe that Active is cardio; the less weight in your ruck, the more of a cardio workout it is.

Resistance is the strength training; the more weight in your ruck the more strength training you’ll get. Balancing the two gives you a cardio and strength training workout at the same time.

But a Sport?

GORUCK Kill That 5K

GORUCK is widely known for their events, namely the GORUCK Challenge, where participants strap a weighted ruck on their back and cover 15-20 miles over 10-12 hours. The goal with the Challenge is to become a team and put that team before yourself. Overcoming adversity is a main take-home of the event and it’s certainly something I experienced a few years back during my first GORUCK Challenge with class 050.

With the introduction of GORUCK’s new Kill That 5K, they’re taking their proven method of bringing people together for a good time and creating a sport around it. Sure a 5K is nothing new, but I like their approach of adding Rucking to a traditional 5K as social fitness.

Rucking = Fitness = Training = Active

GORUCK Kill That 5K

Rucking is an equalizer, meaning that I could have 40 lbs. in my ruck, my wife could have 15 lbs. and we could be getting two totally different workouts while walking together and talking. That’s not something you can do while jogging. It’s also for everyone, no matter age or ability. Accessibility is what GORUCK has created for Rucking.

GORUCK Kill That 5K

There’s definitely a competitive element to the GORUCK 5K events, with specific patches being awarded to the 1st, 2nd and 3rd place finishers. Everyone still earns a patch for finishing though. To help promote the social aspect of the event, there’s even free beer at the finish line; not bananas. GORUCK is promoting the fun atmosphere of a party at the finish line and using beer to replenish your carbs, not the traditional recovery foods.

GORUCK Kill That 5K

The Kill That 5K series of events was created to specifically show the social fitness side of rucking, making it fun and accessible. The GORUCK Challenge certainly has some misery involved along the way, but with these 5Ks, it’s up to you how much weight you carry and how fast you go. There are weight standards however, for those that want to compete.

It’s been great to see how GORUCK has evolved and I really like the aspect of creating an event that’s for everyone to enjoy and ultimately progress towards a more active life. As I’ve been saying for years, everyone should be able to physically save themselves and staying healthy, fit and active are all key ingredients!

GORUCK Kill That 5K

Find a Local Kill That 5K Event

The GORUCK racin’ series is just kicking off and events are being added across the country. Click here to check out more information on Kill That 5K and where they’re being held, but before you head over, our friends at GORUCK have given us a few discount codes to save you 20% off your registration!

Coupon codes for the next three events are below, so be sure to use them at sign up!

  • San Francisco 4/25/15: ITSTACTICALSF
  • Denver 5/9/15: ITSTACTICALDENVER
  • Seattle 6/26/15: ITSTACTICALSEATTLE
Posted in Functional Strength | Tagged , , , , , , , , , , , | 3 Comments

Data Skimming: 3 Places Your Data Can Be Compromised and What You Can Do

Physical Data Skimming

Imagine that you’re out at a local theme park. It’s been a long day and you’ve been snapping pics, recording video and texting friends and family. You didn’t even notice that your phone battery was running low and now you need a recharge as quickly as possible. Thankfully, up ahead you notice a free phone charging station. You’re in the clear right? Maybe not.

Public services like phone charging stations, ATM’s and vending machines may seem convenient, but the reality is that your data could be at risk when using any of them. It’s easy for someone to create a skimming device that allows them to capture information from your card or phone for use later.

Public Phone Charging Stations

Physical Data Skimming

More and more of these charging stations are popping up in businesses, airports and other public places as the demand for charging devices grows. While they might seem convenient, phone charging stations can be used to strip images and data while your phone is connected.

In some cases, malware could even be uploaded to the phone or device. While there aren’t specific examples available of a phone charging station being used to steal data from a phone, the threat exists and caution should be taken.

Avoiding these chargers is the best practice, but if you’re absolutely in need of a charge and can’t avoid plugging up, consider using a condom. A USB Condom that is. Since USB is capable of carrying power and data simultaneously, the USB condom blocks the data pins inside the USB and only allows power to flow through.

Alternatively, you can also carry USB cable and a wall charger to plug directly into a wall outlet. Just be cautious here too and if it doesn’t look like a standard outlet, avoid it.

ATM Skimmers

Physical Data Skimming

ATM’s can be an extremely convenient way to get cash when the bank is closed, or when you just don’t feel like getting out of your car. Unfortunately, ATM Skimmers are becoming smaller and harder to detect. An ATM skimmer is a device placed over an ATM card reader that’s capable of reading the magnetic card data. These are usually paired with a small camera that records the numeric pad while the PIN number is entered. This gives the thieves access to your ATM card number and your pin, allowing them to create a duplicate card with the same magnetic data and withdrawing money from ATM’s.

The main issue with ATM skimmers is that you won’t know you’ve been hit until it’s too late. Unless someone discovers the skimmer, the thieves can remove it and create the dummy cards to use whenever they like. Most ATM’s provide balance information about your accounts, including savings, with nothing more than the ATM card and your PIN. Meaning thieves with your data could continue checking your account for the perfect opportunity to strike.

So what’s the best method to avoid ATM skimming? Don’t use them. If you’ve got an event coming up that requires you to have cash, head to the bank when they’re open and go inside to withdraw cash. It’s less convenient, but getting cash directly from a teller is much more secure. If you absolutely have to get cash and the bank is closed or not available, try to find a gas station or other merchant that offers cash back. Cash back usually offers you $10 – $40 and is more secure than using an ATM.

Changing your pin number occasionally can also help keep you more secure. Many people keep the same PIN number for years and never think about changing it. Your PIN number is a password that protects your bank information and having the same four or six digit code for years increases the risk of having that information compromised.

Vending Machines/Credit Card Terminals

Physical Data Skimming

These days, everyone is accepting credit cards for anything from a soft drink to a charitable donation. The rise of handheld credit card scanners and plug & play scan devices means that anyone can get set up to take credit cards within a few minutes.

Recently while leaving my local supermarket, I was approached by a gentleman asking for donations for his organization. When I gave my usual response that I don’t carry cash and only have plastic, he responded that was okay since he had a credit card terminal. As I left the parking lot, I was even more amazed to see that people were actually swiping their cards to give donations to this person. While he may have been with a legitimate organization, he could have been skimming the data and using it for other purposes.

Credit card skimming is a much more dangerous issue, since cards can be used virtually anywhere including the Internet. Skimmers can take the information and rack up thousands in charges before you’re been alerted to the fact that the card was compromised. If you think that having the 3 digit code on the back of your card will protect you from card theft, keep in mind that cameras are getting smaller every day and the resolution is getting better. It would be easy to capture that information as the card was run through a scanner.

Also be wary of holding your card out in public in situations like waiting in line to pay. Cell phone cameras can be used to snap a picture of your card and if enough information is visible, the thief won’t even need to run the card through a scanner if the photo gave them all the information they need.

Not using unattended credit card terminals as found on vending machines and other public devices ensures that your information isn’t available for capture. Frequently requesting a new card number from your credit card company is also a best practice, as it minimizes the time any thieves would have to use your information. Many times, credit card companies allow you to tailor the fraud detection on your card and you can increase the monitoring while decreasing the maximum purchase amount. At times, this may be inconvenient since you may need to call the company before making larger purchases, but it can help avoid unauthorized charges from going through.

Use your best judgement when it comes to ATM’s, charging stations and credit card terminals and remember that if it doesn’t feel right, it probably isn’t. It would be better to err on the side of caution than risk having your data stolen and potentially spending months straightening it out.

Posted in Security | Tagged , , , , , , , , , , , , | 13 Comments

Gear Up for Spring with the ITS + Huckberry Spring Shop

ITS Huckberry Spring Shop Main

Spring is here and after a long winter, it’s time to get back in touch with nature. Gear up for your next adventure with some awesome products from our friends at Huckberry, who reached out and asked us to hand pick some of our favorite items from their lineup for the ITS + Huckberry Spring Shop. While it was difficult, we finally got the list narrowed down to our favorite items!

The products available include some items personally used and endorsed by staff at ITS HQ, as well as a few items on our own wish lists too. Either way, there’s a little something for everyone in this Spring Shop and any item included also makes a great gift!

There is however one catch, which is the requirement of signing up to gain access to these special deals. Don’t let that stop you though; it’s completely free and totally worth it. The best part is that once you sign up, you’ll get a personal referral link to share with whomever you want. The link gets them $5 for signing up and nets you $10 in Huckberry credit once they make their first purchase. A pretty awesome deal if you ask us!

Click here to check out the ITS + Huckberry Spring Shop!

Don’t forget that Members of ITS get a special deal of $10 in free credit after making their first purchase on Huckberry.com. Members, please sign in and visit the Vendor Discounts page for more information.

Posted in ITS Information | Tagged , , , , , , , , | Leave a comment

New ITS Elements Morale Patch Collection Reminds You to Wash Your Spirit Clean

Elements Morale Patch Collection

Today we’re excited to be adding the new limited edition ITS Elements Morale Patch Collection to the ITS Store! These highly detailed patches capture the spirit of the outdoors by showcasing the natural elements that highlight its beauty. The collection also aims to live up to John Muir’s famous quote:

Keep close to Nature’s heart… and break clear away, once in awhile, and climb a mountain or spend a week in the woods. Wash your spirit clean.

Elements Morale Patch Collection

Earth, Wind, Water and Fire come together here to emphasize all that makes nature so wild and formidable. Let these patches serve as your reminder to wash your spirit clean once in a while.

Pick up the new ITS Elements Morale Patch Collection Here!

Posted in ITS Information | Tagged , , , , , , , , , , , | 7 Comments

Lone Star Medics 2nd Annual Field & Tactical Medicine Conference

Lone Star Medics 2nd Annual Conference

Lone Star Medics is hosting their 2nd Annual Field and Tactical Medicine Conference in Dallas, Texas March 28th & 29th. This two day event includes a variety of classes and lectures as well as a social mixer. Limited seats are available so if you’re interested, it’s best to act quick.

Over 20 well known instructors in the field and tactical medical training industry will present hands-on instruction in field and tactical medicine. Each instructor will present at two different levels, the layperson’s level and the healthcare professional’s level.  There are no prerequisites for any conference session.

Who Should Attend?

Anyone that wants to learn how to identify and treat injuries related to either a field environment or tactical environment should consider attending the conference. Injuries can happen far from a hospital and depending on your line of work, there may also be the possibility of a violent attack. It’s vital to have the skills and mindset to render aid in those situations.

Individuals from all walks of life and backgrounds are invited to take part in this conference.

  • Paramedics and Emergency Medical Technicians
  • School administrators and teachers
  • Prepared citizens
  • Outdoor sports enthusiasts and hunters
  • Law enforcement
  • Families and parents
  • Medical professionals

What Subjects will be Discussed?

  • Identifying & treating common K9 injuries in the field
  • Dental emergencies in a field setting
  • Controlling moderate to severe bleeding
  • Acupuncture techniques and modern application of this ancient remedy
  • Eye injuries in the field
  • Herbal medicine
  • Medical considerations during active shooter/mass casualty events

When & Where

March 28-29, 2015

MCM Elegante Hotel-Dallas
2330 W. Northwest Highway
Dallas, TX 75220
214-351-4477 or 877-351-4477 (toll free) Front Desk/Room Reservations
Tell them you’re with “Lone Star Medics” for a better rate!

To register for the conference as well as get more information on instructors and subject matter, visit the Lone Star Medics Conference page.

Editor-in-Chief’s Note: Caleb Causey is a good friend and the owner & director-of-training for Lone Star Medics; a field and tactical medical training company. He’s been a medic for over 15 years in field and tactical medicine, having serving in the US Army as a Combat Medic with multiple deployments. He also has experience being assigned to a SWAT team as their medic during his time at a local fire department. Caleb teaches several different levels of field and tactical medicine for civilians, law enforcement and the military. Be sure to visit him online at lonestarmedics.com.

Posted in News | Tagged , , , , , , , , , , , , | 5 Comments

Life on the Road: Maintaining Security While Traveling

Security on the Road

This past spring, my girlfriend and I resigned from corporate jobs in Boston intent on a year long road trip. We spent 2 months living at my parents house building a Sprinter van into a camper and in mid-August, hit the road with our apartment on wheels. For the last 10 weeks, my girlfriend and I have traveled from Maine to Northern California, continuously redefining and tailoring our situational awareness and operational security along the way.

Living in Boston the last five years there were rarely situations that I felt unsafe. Most of the time being smart, avoiding bad areas of town, not staying till last call at the rougher bars and combining a good dose of common sense, kept life pretty easy and predictable. In the rare instances where a situation developed that felt off or was clearly bad, it was usually easy to step into a well lit safe place within very short order. Basic things like not making calls or texting on my cell phone while walking in public helped keep me stay aware of my surroundings more actively. I’d gotten to know many of the variables of the city and took the logical steps to mitigate risk. However, making the shift to life on the road changed all that.

Security on the Road

With our surroundings changing on a near daily basis, we’ve gotten the opportunity to see and experience new places and people we wouldn’t have otherwise. It’s been nothing short of fantastic, but that variance has provided challenges. No longer do I know where the good or bad neighborhoods start or end, which dive bars are safe to stop in for a High Life and which will have the music grind to a stop the moment you walk in. Often times we’re nowhere near a known, safe, well lit haven, as we’re frequently camping well off the grid. Out of this, I’ve identified a few tips I think can be valuable to consider if you travel frequently or have chosen to live on the road.

Security on the Road

Be Cognizant of Social Media

We all know what posting our birthdays, high schools and first cars can lead to from a social engineering standpoint and this only gets magnified with traveling. A live post from the road alerts people not only to your current location, but that you’re not at your stationery home. Keeping posts general to an area you’re in and not pin point specifics is prudent. If possible, try to lag your posts by a few days so it’s not live from your current locale. A moving target is rarely a soft one. For me this is a constant balancing act since I’m a freelance photojournalist and posting live often comes with the territory. Even small counter measures are better than none.

If You Feel Uncomfortable, Keep Moving

Traveling, even for fun, can get tiring. Finding a place to stay after long day on the road, whether a spot for a camper van, hotel, or an Air BnB is usually the last thing you want to do. The first option may be the one you want to jump on, but if it feels wrong don’t stay. Why risk it? You might lose a little sleep in the short term as you find a better option, but it’s better than a night of restless sleep where you’re perking up at every sound. Prudence is always worth the peace of mind.

Security on the Road

Talk to the Locals and Be Polite to a Fault

You’re on their turf, so don’t go running your mouth or thinking you know how things work, as you most likely don’t. Most locals are proud of where they live and will want to show you the best of it. They’re an invaluable resource so check in at visitors centers and get recommendations. Since the people working there are from the area and want you to enjoy your experience in their town, they’ll rarely give a bad recommendation and never an unsafe one. When you find a coffee shop or bar you like, tip well and talk to the bartender or barista. Ask them where to go, or if there are places best to avoid. Doing this will allow you to figure a place out quicker and enjoy your stay that much more.

Secure Your Valuables: Don’t Flaunt What You Have

It’s classless to do so wherever you are, but sometimes it can be dangerous. This becomes magnified when all your belongings are in a vehicle or a rolling suitcase. If you’re parked or camped, keep important things stowed safely and out of sight. Always double check the locks on your vehicle and if someone starts showing undue interest in you or what you have, it’s time to refer to my second point and move along.

I admit that none of these insights are revolutionary.  They’re smart things to do at all times, but being on the road and traveling magnifies the need to adhere to them. Keep them in mind the next time you head out for a trip and safe travels!

Security on the Road

Photos © Jon Gaffney and Gale Straub

Editor-in-Chief’s Note: Jon currently lives a semi-nomadic life with his girlfriend traveling North America in a camper van of their own design. If he’s not hiking, climbing, waterskiing, or attempting to surf you’ll probably find him playing with a camera. You can follow along with his antics on Instagram.

Posted in Mindset | Tagged , , , , , , | 15 Comments