Lt. Colonel Dave Grossman: Bulletproof Mind

It’s safe to call Lt. Colonel Dave Grossman a legend in the military and law enforcement community. Col. Grossman is the author of “On Killing” and “On Combat.” Arguably two of the most advanced and influential books on the psychology and physiology of the down and dirty business of making the world a safer place.

I had the honor and pleasure of attending one of Col. Grossman’s seminar’s earlier this month; after years of hoping for a geographically reasonable distance for one of his popular training sessions my expectations were high, and I can honestly say they were met and exceeded on every level.

A reasonable review of the seminar is simply not possible in a short post, but I’ll attempt to capture some of the flavor and essence of the subject matter for those who may have an interest in attending one of Col. Grossman’s training seminars. Continue reading

Posted in Mindset | Tagged , , , , , , , | 20 Comments

Last Chance for M855 Design Shirts!

We’ve recently received an update from our friend Wes Helm of M855 Design, that he’ll be shutting down operations for the next two years while he spends some time overseas.

The good news is that before he leaves, his remaining inventory of shirts are available for only $14! After May 31st they’ll no longer be available, so act quickly.

Wes would like to extend his thanks for all the support the community has given him, and We’d like to wish him all the best and thank him for all his hard work on our original ITS T-Shirt.

Safe travels brother!

Posted in Apparel | Tagged , , , | 4 Comments

Important News about Our Store

The  ITS Store is back online after our recent timeout to catch up on orders and solidify our brand new shopping cart system & merchant account. While it’s been a tremendous amount of work to get all the kinks worked out, we’re excited about being able to offer better service and the ability to now accept all credit cards.

Primarily, our reasons for the redesign were that we were severely limited by our previous ability to only accept PayPal. If you’re familiar with the issue surrounding trying to make a credit card payment using an email address previously associated with a PayPal account, then you know exactly what a lot of our readers have been going through when trying to place orders.

We also have a very special announcement! Continue reading

Posted in ITS Information | Tagged , , , | 8 Comments

The Pros and Cons of MREs

We’ve received numerous questions in the past pertaining to MREs (Meal Ready to Eat), namely what commercial MREs are the best to purchase.

If you remember our MRE Field Strip article, where we went into how to repack an MRE for space and weight savings, you’ll know we’re all pretty big fans of the venerable MRE.

Having eaten them more times in the service than any man should, I still strangely love eating MREs, and always pack a few with me just in case.

Today, we’ll jump into some pros and cons of MREs, and list some good resources of where you can go to find out more. Continue reading

Posted in Survival | Tagged , , , , , , , , | 29 Comments

How to Make a Paperclip Lock Pick that Works

tools for making a paperclip lock pick

Today we’re going to show you how to create a Lock Pick Rake and Tension Wrench using two simple paperclips and a Multi-Tool.

As we’ve mentioned in previous Lock Picking articles, the Rake/Tension Wrench is the most versatile combo to carry for bypassing standard pin/tumbler and wafer locks.

In our last Lock Picking article, a lot of people commented that they were unable to purchase Lock Picks, and couldn’t get involved in learning the skill-set.

After today, you’ll have no excuse not to make your own simple picks, buy a cheap padlock and work on your raking technique. In fact, while we demonstrate creating a rake, you could also make a feeler pick to start learning how to “feel” the individual pins and how they move/bind under tension.

paperclip lock pick

Materials

The first thing you’ll need is a supply of larger paperclips. These that we’ll be using are not the standard small paperclips, but the larger versions. One will be needed for the Rake and one for the Tension Wrench. As you’ll see in the video below, it’s easy to snap these as you’re bending the rake.

This will happen if you bend one direction, and then try to re-bend it in the opposite direction. If you keep to a single bend direction though, these will last a long time and remain strong.

A Multi-Tool works the best to create the necessary bends and twists for the combo. You’ll be mimicking the bends of a “C” Rake, and the right angle of a tension wrench with the second paperclip.

Creation

Rather than try to explain the bends and twists, we’ve created a video that will help show you a hands on demonstration of the creation and successful bypass of a pin/tumbler lock. This DIY combo will take a bit longer to use than a standard Rake/Tension Wrench, but nevertheless just as effective.

Please let us know in the comments if you have any questions regarding creation or use and we’ll be sure to answer them.

How to Pick a Lock

You can expect paperclip lockpicks to feel different in the lock than standard picks. Since they take longer to unlock, paperclips are best used when you have no other lock picks available.

That being said, they can successfully pick a pin/tumbler lock, as you can see in our hands-on demonstration above.

Here are the steps you can take to pick a lock using your paperclip lock pick.

  1. Place your tension wrench into the bottom of the keyhole.
  2. Provide very subtle tension with the wrench, rotating it the same way the lock turns.If you apply too much pressure, you may transform the shape of the paperclip. If you don’t apply enough pressure, you won’t be hold the pins you pick successfully. Once you find the right amount of pressure, apply it throughout the entire process.
  3. Place your pick in the upper keyhole. Make sure the hook is facing the pins.
  4. Probe the pins. Insert your pick into the back of the lock and locate each pin, slightly lifting each to see how stiff they are. The pin that is the most difficult to move is the first binding pin, which you should start with. Note: Most common household locks made in the USA have at least five pins.
  5. Start picking the first binding pin. Apply upward pressure to the pin with the pick and continue applying pressure to the tension wrench. Once the pin reaches the shear line, you should feel the pin slightly give. If there’s resistance, continue jiggling the pick and/or releasing just a small amount of tension until the pin reaches the shear line.
  6. Repeat steps 5 and 6 until you have unlocked each pin. Repeat step 5 to find your next binding pin. Then, pick it with the advice in step 6. Repeat these two steps until the lock rotates and unlocks.

Notes

We encourage everyone reading this article to get involved with lock picking as a skill set through various lock sport groups such as Toool and Lock Sport International. There’s a large community out there of people who understand the value of this skill-set and also like to have fun picking locks.

Here’s the Lock Sport code of ethics, which sums things up nicely:

“You may only pick locks you own or those you have been given explicit permission to pick.”

Lock sport is an honest, ethical, and legitimate hobby. Unfortunately, the whole world hasn’t figured that out yet (though we’re working on it!). Because the lay person has a tendency to perceive what we do as somehow nefarious, it is extra important that we commit to following a strict code of ethics. For this reason, the above credo is non-negotiable in the locksport community. Lockpicking should never, ever be used for illegal or even questionable purposes. Please do not misuse this information. We assume no responsibility for your actions, and in no way condone immoral activity. Help keep locksport fun for all by following strictly the one rule.

Posted in Lock Picking | Tagged , , , , , , , , , , , | 65 Comments

Hong Kong Producing Fake CAT Tourniquets

Just received an alarming tip from a reader, alerting us to a knockoff CAT Tourniquet being produced by a Hong Kong Airsoft Company.

A general email was distributed to the DOD on May 10th with the following PDF on how to tell the difference between the North American Rescue Combat Application Tourniquet and the fake Element Airsoft E-CAT.

[gview file=”https://www.itstactical.com/wp-content/uploads/2010/05/faketourniquet.pdf”]

As we’re sure you realize, fake tourniquets are nothing to take lightly, and the close resemblance of these to the real thing is scary indeed. The possibility of these being purchased by uninformed consumers is real. Please distribute this information to all those you know in harms way, or anyone who could potentially be using a tourniquet. Continue reading

Posted in Medical | Tagged , , , | 7 Comments

ITS 1st Anniversary Party Details

We’ve finalized the details for the 1st Anniversary ITS Tactical Party and we’ll be bumping our original date to July 17th, to give everyone more time to plan.

What we’ve planned is a tailgate at the July 17th home game for the Fort Worth Cats Baseball Team. We’re planning on cooking out in the stadium parking lot starting at 1300, then moving inside for the 17:05 game where we have reserved box tickets.

After the game we’ll be in close proximity to Downtown Fort Worth if anyone wants to stick around and continue the festivities.

Food (and cake) will be provided and we’ll be grilling some burgers and dogs pre-game. A reserved box ticket (behind home plate) will also be provided for free to the first 20-25 people. We’re going to need a count soon, so throw up a comment if you’ll be coming out. The seats will all be together, and there’s space to get more if we need them.

If anyone would be willing to volunteer to bring anything, post it up in the comments. We should be bringing two folding tables, two EZ-up canopies, a grill and food. We’ll bring out some lockpicking stuff, rope for knot tying and some other things to keep us busy before the game. We’re also going to try and get an ITS Banner made so there will be no mistaking where our tailgating is located at when you show up.

Of course we’ll be having some beers too, so bring a cooler and some great conversation! Hope to see you there!
(and yes, you’ll get to see those awesome candles in person too!)

Posted in ITS Information | Tagged , | 18 Comments

Patagonia MARS Clearance at Diamondback Tactical

Just a quick heads up that Diamondback Tactical is running a clearance sale on their remaining stock of MARS clothing in Alpha Green.

They’re offering some killer deals if you wear the sizes they have left.

Posted in Apparel | Tagged , , , , | 1 Comment

Knot of the Week: Rigging a Tarp Shelter, Part 2

Tarp Shelter

When we left off last week with part one, I’d gone through setting up the necessary trunk line to hang your tarp shelter.

Today, I’ll cover attaching the tarp to the trunk line using a Prusik Loop and Prusik Knot. The Prusik Loop is created by tying a Double Fisherman’s Knot. I’ve linked to our previous posts covering these knots, and have also walked through them in the video below.

The biggest benefit of using the Integral Designs SilTarp, is that it features an external center tie loop. Why is this important? If you haven’t had the pleasure of rain wicking down a trunk line underneath a tarp, and dripping on your face while you sleep, then by all means please experience it.

For the rest of us, you’ll see why this is a great feature of the SilTarp. Let’s get into talking a little about the tarp and the attachment method.

Integral Designs SilTarp

Weighing just 7.1 oz with the stuff sack, the 5″ x 8″ SilTarp is made from 1.1 oz ripstop nylon impregnated with .25 oz silicone. It features 16 lightweight nylon webbing attachment loops on the edges and corners, with one center loop on a reinforced patch.

As you’ll see in the video, the tarp is carried with guy lines and Prusik Loops already attached, as well as the trunk line. With the whole kit stuffed in the sack, it measures 7″ long by 3.5″ wide, with a circumference of 11″. The 115.5 feet of paracord carried with the tarp brings the total weight to only 14.2 oz.

Yes, that’s 115 feet of paracord at your disposal, should need it. The trunk line is 30 ft., primary guy lines are 8 ft., secondary guy lines are 5 ft., tertiary guy lines are 6.5 ft., and the Prusik Loops are each made with 2.5 ft. of paracord. That will all make sense once you watch the video below.

One thing to keep in mind with this tarp is that its a single person tarp, Integral designs makes larger SilTarps, but this is one I’ve carried in my truck for two years just in case. Of course it could always be rigged up differently to accommodate more people if needed. Also, all the Integral Designs SilTarps need to be seam sealed with silicone sealant, like McNett’s SilNet. Do this when the tarp is brand new too.

Attachment

As noted previously, we’ll be using the outermost attachment points of the tarp folded in half, including the external center point. This will give us three attachment points, and the ability to create a triangle-like shelter from the tarp.

Instead of reiterating what I go over in the video, I’ll defer to that for instruction on attaching the tarp and an explanation of the guy line system.

Double Fisherman’s Knot » Bends

(Strength: 5/Secure: 5/Stability: 4/Difficulty: 3)

Prusik Knot » Hitches

(Strength: 4/Secure: 4/Stability: 4/Difficulty: 4)

Please refer to our Knot of the Week introduction post for a description of what these ratings mean. 

For instructions on tying these knots please refer to these video above, or our original write up on each of these knots found here Double Fisherman’s Knot (Prusik Loop) and here Prusik Knot

Notes

Join us next week as I finish up the final article and video on Rigging a Tarp Shelter, going though tying the guy line knots and showing how everything packs away. Until then, let me know what you think of the series. Do you carry a tarp like this with you in your vehicle for emergencies?

Links to part 1 and part 3 so you can tie this all together!

Posted in Knots | Tagged , , , , , , | 12 Comments

Infosec and Encryption to Protect Your Secrets

Infosec Encryption MainEverybody has secrets and things worth protecting. It could be your family photos, your saved browser passwords, your bank records, or maybe just that totally legal MP3 collection.

Your laptops, thumb drives and even regular desktop computers all have a treasure trove of data that I’m sure you would not want an unscrupulous person to freely rummage around in.

You’re not alone. The military, rebels, banks and corporations have the same infosec concerns. While your information leaking may not cause a national security crisis, it’s a crisis to you. As a prepper, that means you do something about it now, and not when you come back from the coffee shop bathroom to find your computer gone.

Threat Assessment

Before we go any further, I wanted to take a second for a reality check. Crypto-geeks and some of us survivalists think our primary threat comes from NSA black helicopters coming to “disappear” us. There is something to the strategy that protecting your data from the government protects it from all other threats; there’s also something to the idea of building a nuclear bomb shelter to protect you from burglars.

First, it’s much easier for state and Federal agencies to just request your data stored on third party systems. All it takes is a signed warrant to force your email, cell phone carrier or social network provider to hand over every private message, IP address (which often leads to physical location), and login history. If you want an interesting read, the Electronic Frontier Foundation obtained a  Department of Justice PowerPoint on how LEO’s obtain information from social networking sites.

Second, if SWAT does kick your door open and they seize everything in your house with a transistor, I suspect they have the means to access any data they want. If your state forensics analyst does not have the means, the FBI’s cyber crime unit certainly has access to the computing resources to break your keys within a matter of months (if not hours).

Third, some federal agencies maintain portfolios of security vulnerabilities to use in operations. It could be a hardware or software key logger, a browser vulnerability, or unpublished vulnerabilities in your encryption software. If they do not have the tools on-hand, they likely have the resources to buy them from the black market.

The entire process may add months or years to the investigation, but most any encryption system will be compromised by a sufficiently funded and technical attacker. Worst case, someone breaks your kneecaps and you hand over the keys.  Fortunately, you and I will probably never deal with that. Our attackers will likely will be airport luggage thieves, strangers finding your thumb-drives, disgruntled co-workers, and at worst, professional data thieves such as corporate spies and private investigators.

File and System Encryption Overview

We need to use some specialized tools to lock down where the data sit. In today’s article, we’ll be focusing on file and system encryption software and in particular the TrueCrypt application. There are other tools to consider, such as data scrubbers and hardware encryption, but if properly deployed software encryption can be a near-complete solution for data at rest.

Encryption in general means manipulating information in such a way as it cannot be interpreted unless the reader knows a secret. It is nothing new, and has been practiced for centuries by military leaders and revolutionaries; the kama sutra even lists it as an “art” all wives should practice to better arrange  secret meetings with lovers. Primitive encryption systems originally used the encryption method itself as the shared secret, but more sophisticated algorithms are publicly known, but take a secret password/key. In the computer age, this means storing the data on your hard-drive using an encryption key.

This does not protect you from someone seizing your data while your machine is running, or theoretically if it has been recently turned off five to fifteen minutes. Also, if you are just using file encryption or a file container  and not full-disk encryption, your operating system is likely to store your open file temporarily in an unencrypted area that can be later retrieved.

What it does protect you against is someone stealing your device and accessing the data within. Even a simple operating system password, like a Windows login/screensaver password, is relatively trivial to break even for unsophisticated attackers. Only by encrypting the data on the hard disk platter can you protect it.

TrueCrypt

TrueCrypt is a free, cross-platform encryption system that can handle file, device, and full system encryption. While not open-source, the code is available for the public to review for vulnerabilities and backdoors. This is an important distinction between this system and some proprietary alternatives such as BitLocker, because you have the benefit of thousands of eyeballs looking for flaws, versus an internal quality-assurance team. Also, closed-source security systems have a nasty habit of building backdoors for admins and governments, which become a door for anyone at all.

There are supposedly two authors who remain anonymous; one can speculate about their motivations, but given its track record, I trust it more than black box encryption systems.

Virtual Drives and File Containers

TrueCrypt uses virtual drives to handle encrypted data “blocks”. When you access an encrypted file container or encrypted thumb-drive, it looks like another hard-drive inside your computer. In this example, I’ve loaded the file “SecretPlans” as my Z:\ drive; this means anything I add or edit on my Z-drive is actually inside that SecretPlans file on my desktop. This method allows any of your existing software and OS to interact with encrypted data without any modifications. Neat, huh?

File Container

The example above uses TrueCrypts file containers. You can think of them as encrypted ZIP files or a virtual thumb-drive. Once created, they can safely be emailed or burned to a CD. To create one, just click “Create Volume” from the main window and follow the wizard. This isn’t an article on encryption methods, but suffice to say the AES encryption method is what the Department of Defense  recommends  for all material classified top secret.

Hidden Volumes

An interesting feature of TrueCrypt that you can build a secondary password into encrypted containers and devices for decoy data. By selecting “Hidden TrueCrypt Volume” during the creation wizard, you can set two passwords for the same thumb drive or file container. In the event you’re forced to reveal a password (through the use of rubber-hose cryptoanalysis or you’re re-entering the country) with one password you reveal your actual data, with the second, you reveal some sensitive but unimportant data (such as old credit card statements). Theoretically, because the encrypted data appears statistically random, it’s impossible to determine if there is a secondary encrypted volume present.

Full Disk Encryption

Most of the other encryption methods are useful for a limited set of cases (transmitting containers, carrying them on the thumb drives, etc.), but do leave bread-crumbs on the machine that can be recovered through forensics means. Also, your browsing history, your downloaded email, and other moderately sensitive data probably shouldn’t be in the hands of data thieves. The only sure way to protect these data is to encrypt the entire hard-drive, operating system and all.

TrueCrypt makes this dead simple. After you have a CD burner and a blank CD handy, inside of TrueCrypt type “System” and then “Encrypted System Partition/Drive”. The wizard does a good job walking you through, but it does force you to burn a rescue CD in case it becomes corrupted for some reason. The encryption process can take up to a day, but you can use the system normally and even turn it off. After it has finished encrypting, before Windows comes up on the boot process it prompts you for your password. If you try and access the hard-drive from a bootable CD or with an external enclosure, it’s mostly impossible without a password. Follow the advice for using strong passwords and most any data thieves will be left empty-handed. Even if it means writing it down and keeping it safe, it is better than using an easily cracked password.

Limitations

Fill disk encryption is not a  panacea. It is a tool in your larger information security strategy, like the locks on your door or your carry weapon. Here are some things it does not protect against.

  • Data in motion. Data being transmitting over a network or by thumb drive are leaving your encrypted bastion, and can’t be protected.
  • While the machine is running. Your data are unencrypted while the machine is running, so if someone gets access via malware or  seizure it is not going to do a lick of good.
  • If your backups are unencrypted. Your external hard drive and your DVDs that hold your backups need to be encrypted to, otherwise you left your back door open.
  • If a skilled data thief is prepared to capture RAM data if the machine is recently turned off.

Conclusion

Infosec, like any other operation, requires considering attacks from all sides, mitigating the risks, and using the right tools. While it’s not taking on the nuclear wasteland with your AR and a case of  jerky, as a prepper you understand threats come from all places.  If you want to protect yourself against a PI your ex-wife hired or a curious, power-hungry TSA agent, then consider encrypting your devices and system.

 

Posted in Security | Tagged , , , , , , , , , , , | 11 Comments