How To Make Sure Your Photos Are Not Giving Out Your Homes Location

Not many people know how much information is attached to the photos that they take and put online. This is called exif data. Depending on the device taking the photo this can range from the device model to the name of the owner and the GPS location the photo was taken.

If you enjoy this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the site.

Most social media sites scrub this data before you photo is attached to your profiles or posted but you should not depend on them to do it or count on it to to work. In addition you are still submitting this information to them to do with as they please or sell to whoever they please.

Recently we came across a post craigslist when searching the cars for sale for a client. We saved a picture to send them and when we went into our photos app the photo was organized by location. This is because the camera/phone that took the picture had GPS location turned on and embedded the data into the picture file. A criminal could take this information and potentially use it to find the location of the car or where the owner lives in order to steel the car or otherwise target the owner.

Make sure you scrub this information from your pictures before you put them online or send them to anyone (you don’t know what they are going to do with it after you send it to them.) There are may methods that you can use to do this but the most reliable is a dedicated app. There are both mobile and desk top apps made specifically for this purpose.

OTHER METHODS

Screen Shot Method: Open the picture full screen on your device and take a screen shot. This essentially duplicates the picture and none of the original exif data is present. You still however may have some exif data attached but it will almost always be less.

Messenger Method: Some secure messengers will wipe data from files that you send to others. You can then re-download the file from the message thread and the exif data will be gone. Test your messenger with a thread to someone you trust to make sure the data is removed before relying on this method.

New apple IOS Spoofing: Newer apple devices and some that have received recent updates, now allow you to manually change or add certain exif data that is attached to images on the device. This is intended to organization and data base use for individuals who take a lot of photos and video but can just as easily be used to spoof certain data for security and disinformation purposes.

Desktop/Mobile Apps: Dedicated apps can be found on all platforms mobile and desktop for the specific purpose of removing exif data but just like with the messengers, test and verify before you rely on anything.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the site.

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram

Why You Should Be Networking

Networking has been given a bad name. Most people think of it as meeting in some dining haul and throwing business cards at each other for a couple hours and then going home. True networking is as far from this as could be and it should really be known as relationship building.

If you want to support us take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here and Get the most out of our posts by subscribing to our telegram

This relationship building is one of the corner stones that HUMINT operations are built on. whether it’s an intel operative in a foreign country or a patrol officer working his own city. One of the first things the good ones do is start developing relationships. These relationships allow them to keep a finger on the pulse of the area they are working.

Building a network is just as important in every day life but that is amplified when traveling, especially if you are traveling solo, or in times of disaster or crisis. Your network can tell you where the good restaurants are, which neighborhoods to avoid, and are more likely to lend you a hand if something goes wrong.

It’s better to be known than to be a stranger especially if you are somewhere new that you don’t know well. If you’re a stranger people might be suspicious of you, but if they know you they might give you the benefit of the doubt. This can be good if a large emergency or crime is committed as it might keep you from being public enemy number 1 just because they don’t know you and can keep you from becoming a target of their criminals because you have some connection to the locals.

Network building is pretty simple in theory. Build relationships right? Most of us can do this on a natural basis somewhat effectively if all the conditions are right but when we set out to do it deliberately it tends to not work out as well.

This is because most people don’t fully understand the patterns and behaviors that are established in our instincts when it comes to building relationships but whether it’s for business, intelligence, or your personal life, if you want to be successful at anything you need to be deliberate in your actions.

Like so many things it starts with research and planning. You need to know what your goals are for your network. If it’s for business what are your business goals, who can help you achieve them and if you don’t know the people who can help you, who do you know that does? Map it out if you have to and start there.

Most networks consist of three kinds of people, your inner circle(your most trusted contacts or friends) long term contacts(your vetted, People that will look out for you and vice versa.) and short term contacts(your acquaintances/intel sources) They may owe you a favor, or just be someone you just met that hasn’t moved up the ladder yet.

Short term contacts are just what they sound like short term. These are the people that you have recently met, maybe you haven’t vetted them completely enough to make them long term contacts yet, or you just haven’t found a way to work them into your network in more long term way.

These are the people that you maybe threw a bone and did them an easy favor and now they owe you one, or a trade show rep you just met and had drinks with, or maybe the B&B owner who just let you into the property. They may be able to open some doors or point you in the right direction on something if you need it.

You wont spend as much time or effort maintaining the relationship with these contacts but they are good to keep in some contact with as you never know when you might have a need they can help you with, vice versa, or how they could wind up as a long term contact someday.

On the security side this is where you do need to be careful as this is where you have the best chance of stopping insider threats before they start. Trade shows and other events where you will be meeting these new contacts are usually a hunting ground for corporate espionage agents as they are always looking to gain access to some form of insider information that they can either sell to the highest bidder or take back to their own company.

Someone at the hotel or air B&B might be feeding marks to a thief ring or worse.

Long term contacts, these are those you have vetted and given strategic positions in your network. They maybe business partners, friends, they could be your family members, and trusted intel sources but you still may not trust them completely And most of them are not in your inner circle.

These people support you, and protect you and you them. You can generally depend on them but they may or may not drop everything to help you if you need it and vice versa. You’re regularly in contact with them and you may even spend some of your personal time with them.

From the security stand point as you don’t trust these people implicitly you should remain careful what you say around them and monitor what they have access to as this is where they would likely start having access to the more critical information or access to you or your business. This is where some damage can be done in one way or another if a threat has made it this far.

Your inner circle, is where you have your most trusted friends and business contacts that you trust implicitly. This does provide a security risk as they will have the most access to you and any private information, however you should have vetted them and established a tight enough relationship that you trust them in this position. Provided you are careful, only the long cons, very good liers, and people with good back stories or resources should make it this far as threats. The major threat you need to be carful of is people within this circle becoming compromised to the point that someone can control their actions.

You should always strive to have at least a couple super connectors in your network. Especially when you’re growing a business network.

Super connectors are people that either intentionally or as a side effect of their situation (profession or socially) are connected to a large number of individuals in a variety of bubbles (industry or location), professions, or social circumstances.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here and Get the most out of our posts by subscribing to our telegram

Stop Getting Deliveries at Your Home

For the security conscious, or if you are a targeted Individual(LEO,Govt., SOF, Celebrity, etc. a habit that you should break is having things delivered directly to your home(especially in your own name). For one this links your physical address to your name.  This information is then easily accessible in people search databases who get this data from the shipping companies.

Now if you have ever had anything delivered to your home address its already out there but you can stem the damage by not taking further deliveries until you can remedy the situation later. Your name and address are still out there to find but if stuff is not coming to your house any more the possibility that someone legit would be just dropping by is much less allowing you to respond more quickly with out having to figure out if they should actually be there.

The biggest step you can take to further your home and personal security is to separate your name from your physical address, with that said this is much easier said than done and can take much more work than be covered here but the information is out there for those that want to pursue this. We will also cover this in more length in our telegram and Matrix rooms.

Back to the topic at hand, when you have things delivered to your home directly you open the door for people to have a justified reason to be on your property. This can be anything from Take out to UPS to appliance deliveries We mean everything, This means that when someone drops by unannounced, you have to then figure out if they belong there or not and if the situation is suspicious or the person poses a threat. Keep in mind that just because they are wearing a uniform of some kind does not mean they are legit.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get  a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​

Secure Your Trash

A lot of information can be gleaned from your trash and most people don’t give too much thought to what they throw away up to and including their bank statements. Most will think who would go through my trash and in most cases its true they are not actively being targeted to this level.

However this another one of those tactics that if you don’t apply it before you are targeted you’re already too late. Think about stalkers. The victims usually don’t know for at least a little while that they are being stalked (unless they had a prior relationship). The stalker could (and they do) steal the trash and use the info the glean to further their activity. Or if you are a wealthier individual or a C level employee or even just a head of a department at a larger company. You have access to info that is desired by a lot of individuals in the realm of corporate espionage. The info they could glean from your trash could lead to anything from black mail to robbery to in extreme cases murder if its just easier to make you go away to set your project back a bit.

To counter this, a good rule of thumb to follow is that only organic (food or food containers) get thrown in the trash (or recycling). If the packaging from other items is clear they can be thrown away to.

If its paper/card board it either gets shredded and then mixed up with other shreds and thrown out in batches or its burned. (especially important with anything financial or with personal info on it), or you it can be shredded then burned if you are particularly paranoid or you have a high level security concern.

Now when traveling or on the go never throw out anything with personal information and avoid using any trash cans that are in your room/office or location that can be tied to you. Take your trash with you when you leave and if it doesn’t need to be shredded or burned throw it out in a common area trash preferably the dumpster or a trash can at another location. This makes it harder to link any info you may be throwing out specifically to you.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get a small commission that helps support the

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​

 

Dodging Drones intro

Drones are quickly becoming a bigger and bigger part of everyday life. From governments to private citizens, for recreation to emergency response, and military operations. With this rapid expansion it’s only natural that criminals and their organizations have started using them as well.

This is ranging from smuggling contraband, IEDs, and illegal surveillance which can range from the neighborhood creep to high-end corporate espionage and organized crime such as recon for cartel groups and so on.

The average citizen wont likely encounter the majority of these except some form of illegal surveillance. The most common examples of this are peeping Toms, stalkers, and paparazzi for the more famous people out there. All three of these groups have been caught using drones to accomplish their tasks in one form or another. Papparazi don’t need to scale a fence or wall anymore when they run a drone from the road or side walk and get better pictures.

If you’re a high profile or targeted individual you also can’t rule out criminals and organizations that are targeting you from using drones for site recon, tailing, etc as they would be stupid not to. There is a reason that Law enforcement and the military started using drones in the first place.

The tactics used to counter a drone operation against you is going to depend on the your situation. Mainly, who is targeting you, the quality of the drone they are using, and whether you are mobile or stationary.

If a government or an organization that has access to predators, reapers, or other Nation state drone tech. You options are going to be very limited. As drones will not be the only equipment and type of surveillance directed at you. We will not really be covering this group but keep in mind that many of the tactics for other drones will still apply just to different degrees of effectiveness.

Evading surveillance by drones when you are mobile is going to be the same as other forms of surveillance. You need to break line of sight and then either hide or change direction and move out of the area without being re-acquired.

If you enjoyed this post take a look at our TRUSTED RESOURCES page. If you decide to use any of the links and purchase anything we may get a small commission that helps support the site.

Sign up for our email list and you will receive exclusive content that adds to the articles we post here.

Get the most out of our posts by subscribing to our telegram or Matrix/element rooms ​

 

 

 

When you go some where keep it to your self

The biggest home safety precaution you can take is to keep it to your self when your home will be unattended.

This means if your going on a trip don’t post it on social media until after your back. Especially don’t post specific dates or times prior to leaving and do not post pictures or anything about your trip until after you get back.

Making it known that you are gone is asking for something to happen to your house while you are.

Other precautions to take is not getting your Mail held or stopped but have some one you trust pick it up every day, especially if your mail box is at your house to keep up appearances and have them check on your house daily or better yet have them stay there and house sit but ONLY if you really trust them.

A house with mail or news paper piling up is a dead give away. Now if for what ever reason you don’t have any one you can trust it’s better to hold your mail than have it pile up. The only con is mail and newspaper staff have been caught giving their hold list to a criminal colleague to rob the house but it is a lesser occurring issue than a thief coming across a house with mail piling up.