Monday, December 1, 2014

This War of Mine

This War Of Mine provides an experience of war seen from an entirely new angle. For the very first time you do not play as an elite soldier, rather a group of civilians trying to survive in a besieged city. During the day snipers outside stop you from leaving your refuge, so you need to focus on maintaining your hideout. At night you get a chance to scavenge nearby locations for items that will help you stay alive.

Make life-and-death decisions driven by your conscience. Try to protect everybody from your shelter or sacrifice some of them to endure the hardships. During war, there are no good or bad decisions; there is only survival. The sooner you realize that, the better.

I started playing this game and its really cool. I'm not very wordy today, so I'll quote some other guy quick review.

kainfury • November 21, 2014 11:50 AM

This game is a real gem.
Yes it's depressive, and that's the goal of it:
"War is delightful to those who haven't experienced it - Erasmus".

Your characters will suffer in this game. When you think you have enough food, materials or water, something will mess everything up.

As your character slowly fall in despair, you eventually get in the same mood. But you'll still want to play, because you have hope you can make it through the war.

Brillant. 10/10

Tuesday, October 7, 2014


Hey guys

AFK life has me busy as a one legged man in an ass kicking contest so I'm not posting much as
probably you already noticed.
Argentinian economy is from bad to worse, same as our president mental health...

Anyway bunch of bitches bitching about Windows but all the INT DB downloads I get are for the
Windows version, probably you need to start playing with an easy Linux distro, like Mint, it won't
hurt you.

Lastly I'll do something I didn't do for too long, I'm going to leave you with my favorite song of an
awesome band called Katatonia.

Saturday, August 23, 2014

INTDB for Linux and Mac OS X

Hey guys

Many of you were asking for a version of INTDB to run in Linux or Mac OS and finally after many days of hard work I could find a way to do it.
Sadly this version won't be portable, but the installation process is short and simple and I wrote an step by step tutorial so you shouldn't have any problem.

This new INTDB version will work using XAMPP that is a multi-platform easy to install and use Apache web server with MySQL, Perl and PHP, although we only will use Apache and Perl to run the INTDB TWiki.

So now there will be two distros of INTDB, those are "INTDB Portable for Windows" and "INTDB4Xampp" for Linux and Mac OS X, both distros will keep the same version number for simplicity.

Besides releasing INTDB4Xampp I'm also releasing today the version 1.2 of INTDB, this new version includes:
  • Basic usage & tips guide.
  • Google Earth integration example.
  • The following cheatsheets:
    • Structural Labeling
    • Movement speeds
    • SALUTE report 
    • METT-TC 
    • Glossary
The "basic usage & tips guide" will explain you step by step how to create, delete and edit and how to include multimedia files and documents on your pages.

The Google earth integration example will show you a great tip as you can open .kmz files from your pages an see them on Google Earth and when you close it no traces are left of your work in it.

Also 5 new pages are included with cheat sheets that will help you with your intelligence tasks.

As usual you can contact me if you need any help or would like to share templates or ideas.

Friday, July 11, 2014

Should you continue using TrueCrypt?

It was the last days of May when TrueCrypt website suddenly was took down and replaced with a page suggesting a migration to Microsoft Bitlocker.
No one really knows what happened, I personally believe that the NSA asked the devs to do something they didn't want to, so they decided to completely stop the project, similar to what happened to Lavabit some time ago.

You can find a lot of theories and even declarations of some guys claiming to be the developers, I don't trust much in those claims, as the TrueCrypt developers were anonymous and even if they were the real devs, probably are legally obliged to deny everything and say nothing strange happened.

But the real question is, should I continue using the latest version of TrueCrypt? Is there any other software that I could use to replace it?

If you run Linux is highly recommended you migrate your encrypted volumes to dm-crypt LUKS. Linux Mint 17 Qiana installation wizard includes an option to encrypt your system partition using it, so if you don't know much about Linux, that's an easy way to start.

If you need support in multiple platforms the response is simple, there is no other option than using TrueCrypt.

But is TrueCrypt safe to use?

A group know as OCAP ( Open Crypto Audit Project ) was crowdfounded to do an audit to TrueCrypt source code, on April 14th they released the Phase I Audit report that didn't found anything disastrous on it, they mentioned they had a big announcement coming, but then TrueCrypt project was halted.

So it seems its relatively safe to use TrueCrypt, for sure is way better than no encryption at all and is better than Microsoft's Bitlocker.

Another option if you are on Windows but don't want to use TrueCrypt anymore could be to run Linux inside a virtual machine and that way using dm-crypt LUKS.

But it really depends on how important is the info you are storing, if is your business documents, your porn stash or you live in a country other than US and the NSA wouldn't be asked to decrypt your disk even if they could, just continue using TrueCrypt until we have news about the fork, now called Ciphershed officially.

Wednesday, July 2, 2014

Wikis and the Intelligence Analysis ebook

I just discovered this book called "Wikis and the Intelligence Analysis" dealing with the use of wikis as a tool to work with Intel.

It seems the authors see wikis as a great tool by its usage characteristics that suits perfectly the Intelligence Analysis tasks, I thought it was really cool such a book exists and that maybe it complements itself with the INTDB project I'm sharing in this same blog.

Sadly as the exchange rate here in Argentina is killing me I can't buy a copy to read the book entirely and I was just able to peek it in the Amazon's demo.

If any of you has already read it and can tell me some more about it or would like to donate a copy I'll really appreciate it ;)

Tuesday, June 24, 2014

INT DB TWiki Update

Hey guys,

INT DB has it's first update, here is the changelog:

  • Fixes configure script error.
  • Includes ExitPlugin to take care of the referrer problem.
  • Cleans up previous session log files on start up.
  • Includes security notes in regards to document attachment.
  • Includes POI, Enumeration and alphabetically sorted list templates. 
Besides fixing some bugs, the new INT DB TWiki will clean up the log files when you start it and also solves the issue of referrer leakages, using the ExitPlugin it will automatically redirect to any link using, you can configure another link anonymizer if you wish.

The screenshot in this post is from the Person Of Interest Template, when you create a new page you'll be asked what template to use, there you can select it or also one of the other two included templates, one is a table to enumerate stuff, like your Intelligence requirements, and the other is an alphabetically sorted table to store links to your POI dossiers for instance.

I'm working on a file so you can install easily the INT DB in an already running TWiki installation, so you can use it in other OSs just installing Apache by yourself, soon there will be news about it.


Thursday, June 5, 2014

Moncton Justin Bourqe shooting tinfoil hattery!

Ok guyz, is time for some tinfoil hattery, so get ready! 

A man supposedly called "Justin Bourque" from Moncton, Canada is suspected of shooting five RCMP officers, killing three of them, and was last spotted Thursday June 5th at the morning but still remains at large

More info here guys:

In the article a Facebook account is provided supposedly being of the suspect, now the mysterious facts.

He joins FB on "February 19" this year and creates an open FB account where everyone can see his posts to share gun culture/patriot related posts and images, and goes on a killing spree dressed like Rambo just 4 months after that?

EDIT: He was arrested after surrendering to the police saying "I'm done".

This stills sounds like an OP to me, spree shooters usually end up shot by police or suicide themselves  :tinfoil:

Monday, June 2, 2014

INT DB Portable TWiki

While doing the IPB course at I discovered that the amount of information you have to handle to be able to satisfy your intelligence requirements is huge and will require to be updated often.

I didn't find an already existing tool, and that's why I thought that a wiki page could help, because it's easy to update, can include media files and also keeps track of the changes you made, bad thing about a wiki is that it needs a webserver to run, and not tech-savvy guys will find really hard to set up one. INT DB solves that problem because with just one click you'll have a running wiki that leaves no trace of use in your computer.

INT DB is based on TWiki for Windows Personal but it includes the latest version of TWiki 6.0 with WYSIWYG editor, Tinyweb webserver, Perl and GNU Grep, all of it ready to use, no installation is required and it won't create entries in your registry.

You'll see that the INT DB home page is a plain wiki page for you to start working on, if you can create templates, cheat sheets or whatever may be helpful for our purposes, please contact me and I'll include it in a new version.


Friday, May 30, 2014


The NSA has corrupted the Internet. On June 5, we will Reset the Net. We hope you’ll join us.

June 5 is the one-year anniversary of the first documents leaked by Edward Snowden. While EFF has
been fighting NSA surveillance for years, 2013 marked a new chapter in our battle against mass
spying. The documents made it clear to everyone why we care so much, and why they should too.

Surveillance affects everyone, in the United States and internationally. Millions of innocent people
have had their communications swept up by the NSA’s dragnet surveillance. Thomas Drake, former
NSA official and whistleblower described recently retired NSA chief General Keith Alexander’s
surveillance philosophy: “He is absolutely obsessed and completely driven to take it all, whenever
possible.” This philosophy clearly underpinned his nearly nine year tenure at the NSA. In addition to
this collect-it-all strategy, the NSA has used tactics such as deploying malware, trying to weaken 
encryption, and other sophisticated techniques that make the Internet less secure.

Mass surveillance is toxic for the Internet. The Internet is a powerful force that can promote
democracy, innovation, and creativity, but it’s being subverted as a tool for government spying.

That’s why EFF has joined with dozens of other organizations in calling for a day of action to Reset
the Net. On June 5th, Reset the Net is asking everyone to help by installing free software tools that
are designed to protect your privacy on a computer or a mobile device. Reset the Net is also calling
on websites and developers to add surveillance resistant features, like HTTPS and forward secrecy.

Don’t wait for your privacy and freedom. Start taking it back.


Thursday, May 29, 2014

TrueCrypt defacement a Warrant Canary?

Is the TrueCrypt "defacement" a Warrant Canary?
At the moment no one knows what is really going on, but this is very bad news...

Monday, May 5, 2014

Anonymous Browsing COMSEC Lesson

Hey guys

I just added a new lesson discussing what are the options you have to browse anonymously
on Internet and how good is the anonymity they provide.
Also in this lesson you'll learn what is Tor, how it works, how to install and use it.

As always just contact me if you have any question.

Sunday, April 20, 2014

Bundy's ranch information flow thoughts

This reflects my personal opinion as someone outside Bundy's ranch wanting to know what was going on and just receiving reports like "This is a mess, no one knows shit, the feds didn't shot yet".

I believe Bundy's Ranch event demonstrated a big flaw in Militia's SOP and is that they failed to create an official information source until a week after it started.

An official reporting channel is key absolutely, specially when the opponent is the gov. Venezuela is a clear example, the gov and media report nothing is going on, but people using social media like Twitter report the abuse and violence they are suffering.

If shots were fired and the militia guys in there were reduced to turtle food, the gov could start talking about how the domestic terrorist attacked and they had no other option but to repel the attack, and manipulate how the history is presented to the public.

Every unconventional force first has to obtain populace support to win, otherwise they will fail like Guevara in Congo and Bolivia. Part of getting populace support comes from showing them the flip side of the coin of what mass media feeds them.

A lot of people love to bash Occupy movement, but even if you don't fully agree with Occupy movement methodologies or ideology, there is always something to learn, specially for a country like the US, where you like it or not you don't have much experience manifesting against the government.

Occupy movement guys as soon as they took a place set up free Wi-Fi networks for people to be able to communicate and report anything that was happening, that is awesome, because the first thing the gov does is to shut down cell phone networks.

Also in Spain they created something called the "wifineta" that is a conjunction of the words Wi-Fi and truck in Spanish, that truck has the equipment to provide Wi-Fi and 3G for the people around it.

Also we need to keep in mind the COMSEC, if there is a centralized information outlet, it could define what should be public knowledge and what not, and then instruct the protestors about the information release guidelines.

Check this videos of the Occupy Wi-Fi providing tents.

Saturday, April 19, 2014

Forward Observer #1 is out

Hey guys

Forward Observer #1 is out, it has articles by John Mosby and Max Velocity among others.
Go check it out at:

I'm not posting much lately because real life is keeping me really busy, but as Arnold said
"I'll be back".

See ya

Sunday, March 30, 2014

Friday, March 7, 2014

Metadata COMSEC lesson

What is metadata? The government storing and analyzing it compromises your privacy?
How can you extract it from other people's files? What can you do to eliminate it?

All those questions and more answered in this week COMSEC for preppers lesson, check it out

Sunday, March 2, 2014

Computer COMSEC Email and cryptography lesson

Hey guys

This week I discuss the basic working of email service, it's weak points, what email provider you
should use and a very popular tool called Enigmail that will ease your use of encrypted email.

Hope you find this useful, see ya.

Check the lesson HERE

Friday, February 21, 2014

Why do I need encryption? I have nothing to hide!

You're a normal guy, you have nothing to hide why should you use encryption?

Well, today you THINK you have nothing to hide.

Snowden leaked documents prove that the NSA can store your communications metadata/content for
15 years, 10 online and 5 offline.
Maybe today being a patriot or a gun owner isn't so bad, yes people think you're kind of crazy, but

But let's suppose the next president cares about constitution and civil rights even less than the current
one and decides that your political beliefs, religion or sexual preference is a danger to society and
decides that people like you should be actively prosecuted, incarcerated or maybe summarily

You never know...
And besides that, NSA can't read and catalog your messages and they absolutely hate it!

Computer COMSEC PGP/GPG Lesson

Hey guys

New lesson posted, this time about PGP/GPG.
What it is, why should you use it and the first practice where you'll need to install it and create your
key pair to start practicing and communicating securely.

Check it out HERE

Saturday, February 15, 2014

The day we fought back results

Thanks to everyone who participated on Tuesday. Together we demonstrated that activists,
organizations, and companies can work in unison to fight mass surveillance, and laid a

foundation for escalation over months to come.

In the following link there are some numbers to quantify how we did.

Friday, February 14, 2014

Computer COMSEC Crypto lesson

Hey guys

I just posted today the first lesson of the course dealing with cryptography basics.

This week practice isn't very interactive, you'll need to watch a few videos, but the knowdlege you
will acquire will help you for the next lesson when we will start working with GPG.

Follow this link to start the lesson

Tuesday, February 11, 2014

Computer COMSEC for preppers

Previously I had mentioned there was a big project coming for this year, and here it is, is a course called
Computer COMSEC for preppers. The goal is to provide you with the tools and knowledge to
communicate securely using digital channels.

The course name is "Computer COMSEC" because COMSEC also involves operational aspects that
I would rather leave to more knowledgeable people like Sam Culper at Guerrilla America.

There is plenty of tutorials covering the tools we are going to use but the content of this course will
be targeted to preppers, III%'ers and Liberty Fighters so the lessons will be focused on our particular

Lessons will be in layman terms and explained simply so everyone can participate. More advanced
lessons will rely on previous lesson concepts.

Every Friday I will upload a lesson, article or tip that will include a practice segment which you can
use over the weekend.
These practice segments will be short so they won't eat up all of your weekend but will aide you in
retaining the needed knowledge.

In case you have a problem with the practice segment, you don't understand something, you have
doubts, or there is a topic you would like to see discussed, we have the "Questions & Answers"
board at Unchained Preppers or you can contact me. I encourage you to actively participate and ask
the questions you might have, don't forget your questions will give me ideas for new and future

The course is absolutely FREE and you won't need to spend a single dollar. The only things you will
need is your computer, a 2GB or bigger pen-drive and some time.

This Friday February 14th the first lesson will be available, the intro is already available HERE.

Tuesday, January 28, 2014

Edward Snowden Interview in English (1/27/2014)

Whistleblower Edward Snowden leaked the documents about US mass
surveillance. He spoke about his disclosures and his life to NDR investigative
journalist Seipel in Moscow.

Sunday, January 26, 2014

Thursday, January 23, 2014

Maybe the Most Orwellian Text Message a Government's Ever Sent

“Dear subscriber, you are registered as a participant in a mass disturbance.”

That's a text message that thousands of Ukrainian protesters
spontaneously received on their cell phones today, as a new law prohibiting
public demonstrations went into effect. It was the regime's police force, sending
protesters the perfectly dystopian text message to accompany the newly
minted, perfectly dystopian legislation. In fact, it's downright Orwellian (and I
hate that adjective, and only use it when absolutely necessary, I swear).

But that's what this is: it's technology employed to detect noncompliance, to
hone in on dissent. The NY Times reports that the "Ukrainian government used
telephone technology to pinpoint the locations of cell phones in use near clashes
between riot police officers and protesters early on Tuesday." Near. Using a cell
phone near a clash lands you on the regime's hit list.

See, Kiev is tearing itself to shreds right now, but since we're kind of burned out
on protests, riots, and revolutions at the moment, it's being treated as below-
the-fold news. Somehow, the fact that over a million people are marching,
camping out, and battling with Ukraine's increasingly authoritarian government
is barely making a ripple behind such blockbuster news bits as bridge closures
and polar vortexes. Yes, even though protesters are literally building catapults
and wearing medieval armour and manning flaming dump trucks.

Hopefully news of the nascent techno-security state will turn some heads—it's
right out of 1984, or, more recently, Elysium: technology deployed to "detect"
dissent. Again, this tech appears to be highly arbitrary; anyone near the protest
is liable to be labeled a "participant," as if targeting protesters directly and so
broadly wasn't bad enough in the first place.

It's further reminder that authoritarian regimes are exploiting the very
technology once celebrated as a vehicle for liberation; last year, in Turkey, you'll
recall, the state rounded up dissident Twitter users. Now, Ukraine is tracing the
phone signal directly. Dictators have already proved plenty adept at pulling the 
plug on the internet altogether.

All of this puts lie to the lately-popular mythology that technology is inherently a
liberating force—with the right hack, it can oppress just as easily.

By Brian Merchant 


Tuesday, January 14, 2014

Back from vacations

Sorry for disappearing, I was on vacations.
Is a good habit to mention it once you're back to avoid half the world knowing
your home will be empty and ready to be robbed.

Updates coming soon, and also I'm working on a big project for this year, bear
with me.

hit counter script