Items related to ComSec: Off-The-Grid Communication Strategies for Privacy...

ComSec: Off-The-Grid Communication Strategies for Privacy Enthusiasts, Journalists, Politicians, Crooks, and the Average Joe - Softcover

  • 3.91 out of 5 stars
    11 ratings by Goodreads
 
Image Not Available

Synopsis

The most prolific, comprehensive, and intrusive mass surveillance device ever designed by man is the cellular phone you carry with you everywhere you go. This device tracks and collects a staggering amount of personal information. That valuable data is sold and stored indefinitely by a an equally staggering number of companies, government entities, and data brokers that you never knew even existed. How is this data being used, and how will it be used in the future? Communicating with loved ones, colleagues, and other people is a fundamental human necessity. In today's digital world, the ways in which we communicate are convenient, instant, and often happen without even thinking about the technology that makes it all possible. The privacy of our communications, our movements, and our thoughts are also a cornerstone of a free and open society. COMSEC uncovers the methods used by businesses, data brokers, and governments to harvest our data using the surveillance device that we allow into our lives in order to stay constantly connected. The authors share detailed first-hand knowledge about the tools, trade-craft, and techniques used to mitigate and eliminate the threats posed by tracking our communications. These same tactics, taught to covert law enforcement officers, military operatives, and the clandestine community, are explained here for anyone to adopt for their own personal communication strategy. COMSEC is a must read if private and secure communications is important to you. Choose the tactics appropriate for your threat model, or choose to take more extreme measures. If you are a government employee, service member deployed behind enemy lines, a journalist, activist, dissident, politician, shady character of any type, or a privacy advocate, COMSEC offers the tried and tested solutions that you need to know.

"synopsis" may belong to another edition of this title.

From the Author

A Note From Drew

Consistently, the most popular and discussed topics when I teach digital privacy &security courses are the communications strategies we use. In a digital age where technology connects everyone to each other,students learn that this convenience also comes with many real world concerns. Collaborating with Justin on this project was truly a pleasure and we had a lot of fun compiling so much of what we have learned over the years about secure and private communications.

For me, privacy isn't about hiding something. It's about being able to control how we present ourselves to the world. It is the right to keep things to yourself. Technology allows us to challenge the traditional methods of using a cellular phone and leverage tools to enhance both the privacy and security of our devices. The protection of our personal information, online and in the physical world, has never been more important.

Law enforcement professionals, military personnel, whistle-blowers, and every citizen needs to understand the threats due to the relentless collection of personal data. This book explores many ways to take back control over the information our communication devices collect, share about us,and how to mitigate surveillance efforts that take place without our knowledge or permission. This guidebook is a collection of tactics and strategies that will help you make important changes in how you communicate in order to reclaim your right to privacy.

Lastly, thank you to my closest friends and colleagues who encouraged me to begin sharing my research into these topics over the years. To all of these amazing people in my life, thank you for the inspiration and your willingness to learn more.

Drew M.Homestead,FL

A Note from Justin

I have written several books dealing with end-user security prior to this one. As my experience and knowledge have expanded and matured, so too have some of my opinions and ideas on best practices. One such example is my exhortation to refer to a phone notes a phone, but as a computer.This is true, but it is not the whole story. What I was only dimly aware of at the time is that yes, the modern smartphone contains a computer, but it also contains a much more antiquated piece of hardware that is far more dangerous than the computer. This is the portion that actually makes it a "phone". And the vulnerabilities that the"phone" adds to your iPhone or Samsung or even your Blackphone are difficult to fully grasp.

It amuses (and sometimes embarrasses) me to consider how I thought about mobile phones and mobile phone privacy just a couple of years ago. Or even just a few weeks sago. Penning Chapter One of this work has alarmed me afresh to the risks carrying a phone introduces. The one, most important takeaway that I hope each reader gains from this book is a firm understanding of the compromise we all make when we stuff a smartphone into our pockets and purses.As a society we should be far more aware of and concerned about this than we are.That is why the first chapter of this book is, to me, the most important. Read it, internalize it, and share it with others.

Writing the remainder of this book and working with Drew (on a project that was originally his idea)has been a pure joy. Very little of what we covered here is entirely new ground, but I do feel that we have both added new value to the topic. We hope you enjoy it, and more importantly, learn from it and put the techniques here into action.

Justin CarrollWest Chester, PA

About the Author

Justin Carroll is a former Marine, plank-owner in the elite Marine Special Operations Command (MARSOC) and has worked on a contractual basis with another government agency. After completing his last overseas deployment, Justin spent five years teaching digital security and identity management to hundreds of soldiers, sailors, and Marines of the United States Special Operations Command (USSOCOM) and was instrumental in the development of a highly technical surveillance program currently in use abroad by US Special Operations Forces. Justin resides just outside of Nashville, TN and is the author of Your Ultimate Security Guide: Windows 7, and Your Ultimate Security Guide: iOS. He co-authored The Complete Privacy & Security Desk Reference and is the co-host of The Complete Privacy & Security Podcast. You can follow and contact Justin through his blog: operational-security.com
Drew M. is a Detective in one of our nation's largest cities assigned to high profile cases that often require covert investigative skills. He investigates crimes involving narcotics, gangs, adult & child sex crimes, human trafficking, and Internet crimes against children (ICAC Task Force). As an open source intelligence analyst and computer forensics and cyber-security specialist, he utilizes these skills to assist in criminal and private investigations of all types. He is a veteran investigator at his agency, and forever a proud United States Marine with overseas deployment experience. First and foremost, he is a privacy and security advocate with a passion for teaching digital operational security and identity management solutions. His classes are available nationwide to law enforcement, military organizations, and select groups in the private sector. You can follow and contact Drew through his blog: hidingfromtheinternet.com

"About this title" may belong to another edition of this title.

Buy Used

Condition: Good
Item in very good condition! Textbooks... View this item

Shipping: FREE
Within U.S.A.

Destination, rates & speeds

Add to basket

Search results for ComSec: Off-The-Grid Communication Strategies for Privacy...

Stock Image

Carroll, Justin; M., Drew
ISBN 10: 1722124784 ISBN 13: 9781722124786
Used Softcover

Seller: SecondSale, Montgomery, IL, U.S.A.

Seller rating 5 out of 5 stars 5-star rating, Learn more about seller ratings

Condition: Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Seller Inventory # 00074362170

Contact seller

Buy Used

US$ 598.46
Convert currency
Shipping: FREE
Within U.S.A.
Destination, rates & speeds

Quantity: 1 available

Add to basket