A weekly compilation of valuable information and insights for the citizen defender. These posts will contain links to my writing as well as posts that I believe are worth the time and trouble to read. They will cover the entire gamut of personal security, electronic security, self defense, firearms, equipment, and more.
Jeff Cooper's Commentaries, Thanksgiving 1993
As we celebrate our traditional festival of thankfulness, we Americans may ponder a bit on what we are being thankful for. I do not think it seemly to dwell, at this point, upon the individual disasters with which we are beset, since gloom-saying never accomplishes anything worthwhile. The times are indeed very dark - probably darker than any time since the founding of the Republic, but while we all do our individual best to hold back the tide of disaster, we should in truth take a moment to remember the good things that we enjoy. It is fitting that Thanksgiving should be celebrated at a feast, because come what may, we all have plenty to eat. In truth, there may be Americans here and there who are temporarily on the ropes, but they are exceptional and unusual. On the contrary, the thing that most foreigners observe first about Americans is that they are uniformly too fat. No, hunger is not our problem, but the loss of our liberty is. So while we do our best to hold back the political night which threatens us, we can enjoy our traditional feast with family and friends - realizing that the news is not all bad.Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
Don’t click that link! Threat actors are increasingly turning to information stealers in malware delivery, and Proofpoint threat researchers have observed an increase in the variety of commodity information stealers regularly used by cybercriminal threat actors. While many threat actors prefer malware-as-a-service offerings like Lumma Stealer or Amatera Stealer, some actors prefer to use malware that can be purchased one time, or openly available on platforms like GitHub. Stealerium is a good example of this. In 2022, it emerged as a freely available open-source malware on GitHub, and is still available to download “for educational purposes only.” While open-source malware can be helpful for detection engineers and threat hunters to understand the patterns of behavior for which they can develop threat detection signatures, it also provides a different kind of education to malicious actors. These actors may adopt, modify, and possibly improve the open-source code, resulting in a proliferation of variants of the malware that are not so easy to detect or defend against.
Attacks and Attackers, Categorized
The types of attacks one may face fall into one of the following two categories: opportunistic and focused or targeted. These two descriptions exist on far ends of the spectrum; every attack will fall somewhere between the two.
The subject of escape and evasion is everywhere at the moment. One can find it featured in print and in online videos, there are even entire blogs, podcasts, and websites dedicated to the subject. In addition, escape and evasion seminars are being taught all over the world — there is no shortage of information on the topic.
Derided as a tool of criminals, handguns are the only reasonable choice in defensive firearms in the vast majority of settings and occasions. The criticism (from people who dislike all guns) is that handguns are small and hence easily concealable. Their twisted logic follows that the opportunity to commit a crime creates criminals who then commit crimes. Hence, their opinion that owning a handgun can transform an ‘ordinary’ person into a homicidal maniac at the slightest provocation.
A Brief History of Tritium in Commercial Use: From Labs to Glow Fobs
When most people think about glowing gadgets today, they might picture stylish glow fobs, or the tritium vials used in keychains and outdoor gear. But the story of tritium in commercial use goes back much further than the modern Outdoor world. Tritium, a radioactive isotope of hydrogen, has been a quiet workhorse for decades, finding its way from research labs into watches, emergency exit signs, and now, into the hands of everyday adventurers.
I have a glow fob on my keychain and have found it very useful when locating my keys in the dark.
A Brief History of the Steyr Scout
The Steyr Scout is the result of the collaboration of many individuals. The scout rifle concept was the brainchild of Jeff Cooper, noted author and shottist who in the early 1980 conceived of the concept of a light, handy, general purpose field rifle (as opposed to a "paper puncher") capable of handling targets up to about 800 - 1000 pounds in weight. In conjunction with several other shooters the concept was codified during several “scout rifle conferences” beginning in December of 1983.
I have an earlier scout and love it. If I could only have one rifle, this would be it.
Deliberate Practice Part 3--Putting it all Together
DTI Quips: The Battle for New Orleans, January 1815
Allowing oneself to be pressured into rash actions is usually a formula for failure. Single-minded people who are unrealistically expectant of continuous, positive outcomes are always candidates for calamity. Pakenham was overwhelmed by romantic prospects and inflexibility in his thinking. The current presidential conflict provides another perfect example. Well-rounded people who live a full life and are thus intimately acquainted with both victory and failure make superior commanders.
Are Martial Arts (or Shooting Training) Self-Defense?
The short answer is 'no.' That answer, however, will create a storm of controversy -- especially from people who have invested years of the study and those who make their living by teaching martial arts/shooting AS self-defense.
What most people do not understand is that “self-defense” is not a verb – it is a legal term.
Why Google is really warning 2.5 billion Gmail users to stop using their passwords.
Google is telling users to change their passwords, but not because of a breach that exposed them. In fact, Google’s real advice is to stop using your password altogether.
If
you enjoy reading these articles, please subscribe. The link is on the
upper right side of the page. All that will happen is that you will
receive an e-mail when I post an article. Your information will never be
distributed.




























