American Tract Society Equips Christians for Olympic Evangelism
Over the next few months, millions of people worldwide will be turning their attention to Salt Lake City, Utah (USA)--the site of the upcoming 2002 Winter Olympics games. American Tract Society sees in the Olympic excitement an excellent opportunity to share Christ with friends and neighbors, and has developed resources to help you do just that. Through evangelistic tracts, pins, pocket guides to the Olympics and other resources, equip your team to take full advantage of the evangelism opportunities presented by the 2002 games.
Web resources for the underground church, sharing the Good News under conditions of persecution, hostility, and extreme danger. This blog explores how Christians can use online resources to share the gospel.
Friday, December 21, 2001
Shedding Light on 'Magic Lantern'
This ABC News report reviews the secret FBI key-logging program called Magic Lantern. Such a program, when installed on a computer, monitors and stores copies of what is typed by the user — say a password that starts an encryption program. Imagine it as a bug, not for a phone, but for your keyboard. This is a fantastic tool to be used against terrorists, but just imagine if this technology was available to others whose motives may not be fighting terrorism.
This ABC News report reviews the secret FBI key-logging program called Magic Lantern. Such a program, when installed on a computer, monitors and stores copies of what is typed by the user — say a password that starts an encryption program. Imagine it as a bug, not for a phone, but for your keyboard. This is a fantastic tool to be used against terrorists, but just imagine if this technology was available to others whose motives may not be fighting terrorism.
Thursday, December 06, 2001
Europe Told to Rethink E-Privacy Directive
Privacy advocates in Europe rally the public and ask Europols to reconsider legislation to be debated before the European Parliament on Friday. Before 9-11, Europeans were much more privacy conscious than Americans and had much stricter inforcement of privacy laws regarding access and sale of private/personal information. Many privacy advocates in the U.S. considered the EU privacy laws as a model to be followed in the U.S., where corporate greed often trumps individual privacy rights.
Privacy advocates in Europe rally the public and ask Europols to reconsider legislation to be debated before the European Parliament on Friday. Before 9-11, Europeans were much more privacy conscious than Americans and had much stricter inforcement of privacy laws regarding access and sale of private/personal information. Many privacy advocates in the U.S. considered the EU privacy laws as a model to be followed in the U.S., where corporate greed often trumps individual privacy rights.
Thursday, November 29, 2001
Self-Executing Virus Hits Net
This should go without saying, but I'll say it anyway, don't use Microsoft Outlook or Outlook Express e-mail programs. They are virus delivery systems with e-mail programs conveniently included. If you must use them, make sure your virus software is updated...constantly.
This should go without saying, but I'll say it anyway, don't use Microsoft Outlook or Outlook Express e-mail programs. They are virus delivery systems with e-mail programs conveniently included. If you must use them, make sure your virus software is updated...constantly.
Tuesday, November 27, 2001
James Bond-Style Gadgets in Demand
Surveillance tech toys, biometrics, and bullet-proof vests are a hit.
Surveillance tech toys, biometrics, and bullet-proof vests are a hit.
Friday, November 16, 2001
New Gadgets Emphasize Mobility
This Washington Post article looks at the cool new tech toys previewed at Comdex. I'm not sure about the Samsung TV Phone, but I'm sure your Trib Force members could use a Handspring PDA-cell phone. Just remember, no Trib Force secrets broadcast in the clear.
This Washington Post article looks at the cool new tech toys previewed at Comdex. I'm not sure about the Samsung TV Phone, but I'm sure your Trib Force members could use a Handspring PDA-cell phone. Just remember, no Trib Force secrets broadcast in the clear.
Saturday, November 10, 2001
Surfing the Web Away From Big Brother
An interesting article from the Korea Herald about online privacy and how to go about keeping your personal information private from online snoopers.
An interesting article from the Korea Herald about online privacy and how to go about keeping your personal information private from online snoopers.
Europe Reruns Through Spy Bill
New surveillance legislation is under consideration by the EU after the 9-11 terrorist attacks.
New surveillance legislation is under consideration by the EU after the 9-11 terrorist attacks.
Thursday, November 08, 2001
Palm Offers Price Cuts, Add-Ons
Now that PDA prices are falling, there's no excuse not to get everyone in your Trib Force a handheld organizer for all your super-secret info. Don't forget to password protect it, though this probably goes without saying.
Now that PDA prices are falling, there's no excuse not to get everyone in your Trib Force a handheld organizer for all your super-secret info. Don't forget to password protect it, though this probably goes without saying.
How to Mate Your Laptop With a Wireless Network
For your on-the-run Trib Force members, some important info on how to be on the go with your laptop. Can you imagine Buck without a cell phone or laptop?
For your on-the-run Trib Force members, some important info on how to be on the go with your laptop. Can you imagine Buck without a cell phone or laptop?
Thursday, October 25, 2001
Farewell Web Freedom?
A look at the USA Act just passed by the U.S. Senate and the implications of this new surveillance authority for civil liberties worldwide.
A look at the USA Act just passed by the U.S. Senate and the implications of this new surveillance authority for civil liberties worldwide.
Wednesday, October 24, 2001
Fears Rekindle Key Escrow Debate
It looks like the info police have gained an edge in the debate over new encryption regulations.
It looks like the info police have gained an edge in the debate over new encryption regulations.
Wednesday, October 10, 2001
Making Your Computer More Secure
In this new age of insecurity, here is some more advice on how to secure your personal computer. This is basic advice, but of course, very few people even bother with the basics.
In this new age of insecurity, here is some more advice on how to secure your personal computer. This is basic advice, but of course, very few people even bother with the basics.
Friday, September 21, 2001
Concern Over Proposed Changes in Internet Surveillance
And, as much as that last entry was good news, this entry concerns potentially bad news for privacy, as proposed changes in government Internet surveillance have the potential to target not just terrorists but the net use of average citizens.
And, as much as that last entry was good news, this entry concerns potentially bad news for privacy, as proposed changes in government Internet surveillance have the potential to target not just terrorists but the net use of average citizens.
U.S. Judges Set Precedent for Workplace Privacy
Some potential good news regarding privacy in the workplace, federal courts agreed to adopt relaxed guidelines for monitoring the Internet use of judges and other employees, a move this ZDNet article suggests could lead to greater privacy protection for workers nationwide.
Some potential good news regarding privacy in the workplace, federal courts agreed to adopt relaxed guidelines for monitoring the Internet use of judges and other employees, a move this ZDNet article suggests could lead to greater privacy protection for workers nationwide.
Thursday, September 20, 2001
How the Al Qaeda Cell Structure Works
Some interesting info from the Washington Post on how bin Laden's Al Qaeda cell structure works:
Cells: Al Qaeda is organized on principles of secrecy and security. Its cells are usually small. Members of one cell do not necessarily know members of another. Cells may remain inactive for years, or only engage in peaceful Islamic activities. For terrorist actions, al Qaeda cells are divided into planning and execution entities
Some interesting info from the Washington Post on how bin Laden's Al Qaeda cell structure works:
Cells: Al Qaeda is organized on principles of secrecy and security. Its cells are usually small. Members of one cell do not necessarily know members of another. Cells may remain inactive for years, or only engage in peaceful Islamic activities. For terrorist actions, al Qaeda cells are divided into planning and execution entities
Wednesday, September 19, 2001
Coalition to Congress: Slow Down
Fearing that too many civil liberties may be given up in exchange for stricter security, a new, multi-partisan group plans to urge Congress to be careful when writing new laws. Declan McCullagh of Wired News reports from Washington.
Fearing that too many civil liberties may be given up in exchange for stricter security, a new, multi-partisan group plans to urge Congress to be careful when writing new laws. Declan McCullagh of Wired News reports from Washington.
Tuesday, September 18, 2001
THE END USER Protect Your PC
Here is an article that makes the case that if you have a computer connected to the Internet, you need to install a firewall defense. And, just as an aside, my ZoneAlarm firewall has been extremely active the last few days, more so than usual I mean. Has anyone else noticed an increase in probes?
Here is an article that makes the case that if you have a computer connected to the Internet, you need to install a firewall defense. And, just as an aside, my ZoneAlarm firewall has been extremely active the last few days, more so than usual I mean. Has anyone else noticed an increase in probes?
This is How We Know Echelon Exists
There has been a flood of news articles about the clash between privacy and national security, this is one of them. We must be very careful as a country that we don't sacrifice the virtues of an open, democratic and pluralistic society. These are the virtues that distinguish US from THEM.
There has been a flood of news articles about the clash between privacy and national security, this is one of them. We must be very careful as a country that we don't sacrifice the virtues of an open, democratic and pluralistic society. These are the virtues that distinguish US from THEM.
U.S. Citizens Back Encryption Controls
Um, no they don't, at least not anyone I know. Encryption controls would not have helped stop the attacks, as the bin Laden cells have beenr revealed to be very lowtek - no cell phone or computers. I've have to check where I read that. Anyway, if the terrorists are seeking to evade being monitored by going lowtek, then the only people who are really restricted by new controls are law abiding citizens. And, if the liberties of citizens are diminished, the terrorists have succeeded in changing our way of life. I, for one, don't want to see them score that victory.
Um, no they don't, at least not anyone I know. Encryption controls would not have helped stop the attacks, as the bin Laden cells have beenr revealed to be very lowtek - no cell phone or computers. I've have to check where I read that. Anyway, if the terrorists are seeking to evade being monitored by going lowtek, then the only people who are really restricted by new controls are law abiding citizens. And, if the liberties of citizens are diminished, the terrorists have succeeded in changing our way of life. I, for one, don't want to see them score that victory.
Wednesday, September 12, 2001
Use of Technology in Tragedy
In the midst of today's tragedy of terrorist attacks on the World Trade Center and the Pentagon many people around the globe found comfort through technology and the Internet. Find out how you can use the Internet to touch base with your loved ones.
In the midst of today's tragedy of terrorist attacks on the World Trade Center and the Pentagon many people around the globe found comfort through technology and the Internet. Find out how you can use the Internet to touch base with your loved ones.
Tuesday, September 11, 2001
Psalm 91:1
"He who dwells in the secret place of the Most High
Shall abide under the shadow of the Almighty."
I will say of the LORD, "He is my refuge and my fortress;
My God, in Him I will trust."
Surely He shall deliver you from the snare of the fowler
And from the perilous pestilence.
He shall cover you with His feathers,
And under His wings you shall take refuge;
His truth shall be your shield and buckler.
You shall not be afraid of the terror by night,
Nor of the arrow that flies by day,
Nor of the pestilence that walks in darkness,
Nor of the destruction that lays waste at noonday.
A thousand may fall at your side,
And ten thousand at your right hand;
But it shall not come near you.
Only with your eyes shall you look,
And see the reward of the wicked.
Because you have made the LORD, who is my refuge,
Even the Most High, your dwelling place,
No evil shall befall you,
Nor shall any plague come near your dwelling;
For He shall give His angels charge over you,
To keep you in all your ways.
In their hands they shall bear you up,
Lest you dash your foot against a stone.
You shall tread upon the lion and the cobra,
The young lion and the serpent you shall trample underfoot.
"Because he has set his love upon Me, therefore I will deliver him;
I will set him on high, because he has known My name.
He shall call upon Me, and I will answer him;
I will be with him in trouble;
I will deliver him and honor him.
With long life I will satisfy him,
And show him My salvation."
"He who dwells in the secret place of the Most High
Shall abide under the shadow of the Almighty."
I will say of the LORD, "He is my refuge and my fortress;
My God, in Him I will trust."
Surely He shall deliver you from the snare of the fowler
And from the perilous pestilence.
He shall cover you with His feathers,
And under His wings you shall take refuge;
His truth shall be your shield and buckler.
You shall not be afraid of the terror by night,
Nor of the arrow that flies by day,
Nor of the pestilence that walks in darkness,
Nor of the destruction that lays waste at noonday.
A thousand may fall at your side,
And ten thousand at your right hand;
But it shall not come near you.
Only with your eyes shall you look,
And see the reward of the wicked.
Because you have made the LORD, who is my refuge,
Even the Most High, your dwelling place,
No evil shall befall you,
Nor shall any plague come near your dwelling;
For He shall give His angels charge over you,
To keep you in all your ways.
In their hands they shall bear you up,
Lest you dash your foot against a stone.
You shall tread upon the lion and the cobra,
The young lion and the serpent you shall trample underfoot.
"Because he has set his love upon Me, therefore I will deliver him;
I will set him on high, because he has known My name.
He shall call upon Me, and I will answer him;
I will be with him in trouble;
I will deliver him and honor him.
With long life I will satisfy him,
And show him My salvation."
Monday, September 10, 2001
Personal Technology: Instant Messaging Grows With New Uses
Another article about staying connected in the Internet Age.
Another article about staying connected in the Internet Age.
Vodafone Denies Rumours That 3G Wont Work
Say it's not so! Every TF needs 3G cell phones, staying connected in a hostile world is a must.
Say it's not so! Every TF needs 3G cell phones, staying connected in a hostile world is a must.
Wednesday, September 05, 2001
Study: Who Needs Privacy Laws?
Some privacy news about the debate over who has jurisdiction. Let's see, should we have government enforce privacy laws, or let the industry regulate itself. What do you think? Regardless, there will always be those trying to get around the rules, and your TF members should be aware of how their personal privacy can be abused in this info age.
Some privacy news about the debate over who has jurisdiction. Let's see, should we have government enforce privacy laws, or let the industry regulate itself. What do you think? Regardless, there will always be those trying to get around the rules, and your TF members should be aware of how their personal privacy can be abused in this info age.
Friday, August 31, 2001
Top 5 Ultralight Laptops
Here is a handy review from CNET of the top laptops for your on-the-go Trib Force members. You never know when you will have to get out of the safe house in a hurry.
Here is a handy review from CNET of the top laptops for your on-the-go Trib Force members. You never know when you will have to get out of the safe house in a hurry.
Wednesday, August 29, 2001
Voice of America Considers Anti-Censorship Tech
Voice of America is considering new technology to allow Chinese citizens access to Web sites now banned by their government. Currently, Chinese government firewalls block many Western web sites, including some Voice of America sites. This sounds like a good way to get around totalitarian governments and get the info to the people.
Voice of America is considering new technology to allow Chinese citizens access to Web sites now banned by their government. Currently, Chinese government firewalls block many Western web sites, including some Voice of America sites. This sounds like a good way to get around totalitarian governments and get the info to the people.
Tuesday, August 28, 2001
Internet Access Via Power Lines Reborn in Europe
Another option for your intrepid TF members, at least for those of you in Europe.
Another option for your intrepid TF members, at least for those of you in Europe.
Monday, August 27, 2001
FBI Claims Tech is National Security Secret in Mob Case
More info on the Scarfo case and the secret method used to record computer keystrokes.
More info on the Scarfo case and the secret method used to record computer keystrokes.
Sunday, August 26, 2001
Which Blog Is Best for You?
If you have decided to add a web log to your Christian web page, this article in WebReview will help you decide which blog hosting service is for you.
If you have decided to add a web log to your Christian web page, this article in WebReview will help you decide which blog hosting service is for you.
Saturday, August 25, 2001
FBI Could Use Carnivore to Sniff Wireless Packets
Carnivore is hungry, snacks on wireless packets. Crunchy.
Carnivore is hungry, snacks on wireless packets. Crunchy.
Big Brother is Watching Wales
Another country where spy cams are used on the public, for their own protection, of course. Who watches the watchers?
Another country where spy cams are used on the public, for their own protection, of course. Who watches the watchers?
Why Personal Firewalls Matter To You
Another article on computer security, this one on the need for a personal firewall, especially if you have a broadband connection to the net. I recommend ZonaAlarm.
Another article on computer security, this one on the need for a personal firewall, especially if you have a broadband connection to the net. I recommend ZonaAlarm.
Tuesday, August 21, 2001
Microsoft Plugs Hotmail Security Hole
I would suggest that your local TF never, ever, use Hotmail or Outlook, wonderful MS products that seem designed to cause security nightmares. This article from ZDNet details the latest attempt by MS to patch yet another hole in their free e-mail service. To which I can only add, you get what you pay for.
I would suggest that your local TF never, ever, use Hotmail or Outlook, wonderful MS products that seem designed to cause security nightmares. This article from ZDNet details the latest attempt by MS to patch yet another hole in their free e-mail service. To which I can only add, you get what you pay for.
Two-Way Messaging Is The Latest Fad
More gadgets to improve the lines of communications between your TF members. This article from Popular Mechanics details their test of seven wireless two-way communicators, or as they call them "pagers on steroids."
More gadgets to improve the lines of communications between your TF members. This article from Popular Mechanics details their test of seven wireless two-way communicators, or as they call them "pagers on steroids."
Excite@Home Warns It May Not Be Able to Continue Operating
If any of you use this ISP, you may want to start looking for a new one. Can't have your local TF without a net connection.
If any of you use this ISP, you may want to start looking for a new one. Can't have your local TF without a net connection.
Good for the Soul - And The Bottom Line
This Washington Post article notes the increase in what they call the new "spiritual economics" of corporate spirituality, or a "a quasi-religious movement, one without a god or theological foundation but filled with moral attitudes and guidelines common to all religions." This would seem to be an opportunity for Christians to share their faith alongside co-workers into yoga, meditation and other forms or neo-pagan spiritualism.
This Washington Post article notes the increase in what they call the new "spiritual economics" of corporate spirituality, or a "a quasi-religious movement, one without a god or theological foundation but filled with moral attitudes and guidelines common to all religions." This would seem to be an opportunity for Christians to share their faith alongside co-workers into yoga, meditation and other forms or neo-pagan spiritualism.
Sunday, August 19, 2001
In the Left Behind novels, Tsion and Buck used the Internet to share the gospel. If you don't already have a Christian web page, what are you waiting for? One of the easiest ways to build community on your web site is to host message boards with a range of topics. There are many different services that will host a message board for you. You can find a list here, as well as helpful reviews. And, if you don't know exactly where to start in building a web page, ask some Christian webmasters for tips, they will be glad to help.
Friday, August 17, 2001
PDAs Ripe for Hacker Attack
According to this report, PDA's (like my trusty Palm Pilot) should not be used to store any critical or confidential information, as they are vulnerable to hacker attack. So, make sure none of your Trib Force members have sensitive information on a wireless Palm or one that is synchronized over a network.
According to this report, PDA's (like my trusty Palm Pilot) should not be used to store any critical or confidential information, as they are vulnerable to hacker attack. So, make sure none of your Trib Force members have sensitive information on a wireless Palm or one that is synchronized over a network.
Little Cell Phone Might Be Seasons Biggest Gadget
This article from the Washington Post reviews the Sanyo SCP-6000 cell phone and gives it a rave review for being the smallest and lightest cell phone on the market. It's perfect for your always on-the-go Trib Force members.
This article from the Washington Post reviews the Sanyo SCP-6000 cell phone and gives it a rave review for being the smallest and lightest cell phone on the market. It's perfect for your always on-the-go Trib Force members.
Thursday, August 16, 2001
Study: Net crawling with hidden, snooping bugs
Another news report on web bugs, this one from CNN. Bugs. Now I feel all itchy.
Another news report on web bugs, this one from CNN. Bugs. Now I feel all itchy.
Tuesday, August 14, 2001
Web Bugs Are Tracking Use of Internet
I hope this is not news to anyone. According to the article, "The use of bugs to track people and to create profiles of them becomes more powerful and, some privacy advocates argue, more problematic when the technology is used by a network of sites linked to some third party." So, I wonder, how safely could Tsion Ben-Judah and Buck actually post their messages on the Internet without their net use being tracked? How would they conceal their IP addresses? In the novels, both Tsion and Buck had very popular web sites that the GC was unable to shut down. In reality, they would have to have their own ISP, servers, etc. to do that, right? If anyone has any ideas, please let me know.
I hope this is not news to anyone. According to the article, "The use of bugs to track people and to create profiles of them becomes more powerful and, some privacy advocates argue, more problematic when the technology is used by a network of sites linked to some third party." So, I wonder, how safely could Tsion Ben-Judah and Buck actually post their messages on the Internet without their net use being tracked? How would they conceal their IP addresses? In the novels, both Tsion and Buck had very popular web sites that the GC was unable to shut down. In reality, they would have to have their own ISP, servers, etc. to do that, right? If anyone has any ideas, please let me know.
"New Living Translation" Now Available Online at Bible Geteway
Here is a great resource for your Internet outreach efforts. Your Ben-Judah will love this. Bible Gateway announces its newest addition, the "New Living Translation," joining an ever-growing collection of searchable online Bibles. Now featuring complete Bibles in 14 languages -- ranging from English to Danish to Portuguese to Italian--the Bible Gateway is a comprehensive study resource for everyone from casual readers to serious Bible students. In addition to the online texts, the Bible Gateway also features numerous Bibles in audio format, so you can listen to a favorite translation or version online.
Here is a great resource for your Internet outreach efforts. Your Ben-Judah will love this. Bible Gateway announces its newest addition, the "New Living Translation," joining an ever-growing collection of searchable online Bibles. Now featuring complete Bibles in 14 languages -- ranging from English to Danish to Portuguese to Italian--the Bible Gateway is a comprehensive study resource for everyone from casual readers to serious Bible students. In addition to the online texts, the Bible Gateway also features numerous Bibles in audio format, so you can listen to a favorite translation or version online.
Claiming The Internet For Christ
In an online world full of evils like pornography and hate, is there room for people of faith to "set up camp" in cyberspace? A recent article online at the Christian Times answers with an enthusiastic "Yes," looking at several inspiring stories of individual Christians and ministries who, instead of condemning or avoiding the Internet, have put it to work in the service of evangelism and ministry. Read about several people of faith who are working to claim the Internet as a medium for spreading the Gospel's message of truth and hope. The article includes a great quote by Dr. Quentin Schultze (IFC/Gospelcom.net Special Consultant), "To turn over the Internet to the forces of evil is counterproductive....There has to be a Christian presence on the Internet."
In an online world full of evils like pornography and hate, is there room for people of faith to "set up camp" in cyberspace? A recent article online at the Christian Times answers with an enthusiastic "Yes," looking at several inspiring stories of individual Christians and ministries who, instead of condemning or avoiding the Internet, have put it to work in the service of evangelism and ministry. Read about several people of faith who are working to claim the Internet as a medium for spreading the Gospel's message of truth and hope. The article includes a great quote by Dr. Quentin Schultze (IFC/Gospelcom.net Special Consultant), "To turn over the Internet to the forces of evil is counterproductive....There has to be a Christian presence on the Internet."
Monday, August 13, 2001
Privacy Digest
This is a great resource for looking into privacy issues. Privacy Digest is a news blog, a daily update of privacy related news articles found on the net. Bookmark it.
This is a great resource for looking into privacy issues. Privacy Digest is a news blog, a daily update of privacy related news articles found on the net. Bookmark it.
Sunday, August 12, 2001
Armey Wages Privacy Crusade
Are we living in a surveillance society, a police state? Not if U.S. Rep. Armey has anything to say about it. And, as House Majority Leader, he does.
Are we living in a surveillance society, a police state? Not if U.S. Rep. Armey has anything to say about it. And, as House Majority Leader, he does.
Saturday, August 11, 2001
Will Big Brother Track You by Cell Phone?
In an emergency, enhanced 911 could be a lifesaver, today at least. But what does the future hold, who will be in charge of this cell phone tracking techology?
In an emergency, enhanced 911 could be a lifesaver, today at least. But what does the future hold, who will be in charge of this cell phone tracking techology?
Off-the-Shelf Hack Breaks Wireless Encryption
Just a reminder that anything sent over the airwaves is fundamentally insecure. There are levels of encryption, of course, and the higher the better, but you can never be too careful. In the day-to-day world, for examlpe, you should never use your home cordless phone to place orders using your credit card number, or reveal your Social Security Number, as these calls are being broadcast. This particular article is about wireless networks, and the same applies.
Just a reminder that anything sent over the airwaves is fundamentally insecure. There are levels of encryption, of course, and the higher the better, but you can never be too careful. In the day-to-day world, for examlpe, you should never use your home cordless phone to place orders using your credit card number, or reveal your Social Security Number, as these calls are being broadcast. This particular article is about wireless networks, and the same applies.
Friday, August 10, 2001
W.W.II Resistance Movements
I've been getting into stories and histories of the resistance movement that developed in European countries under Nazi occupation during World War II. If you want to read about bravery and heroism, that is one era to study. So, let's say a country was defeated by Germany, France for example, and the Nazi's took over, installed a puppet government and life went on. What did average people do? How did they learn to resist? Did the resistance movement spring up on it's own? How would your average civilian population know the strategies and tactics best suited to a resistance movement? As it turns out, the resistance movement in most conquered European countries had plenty of help from the British and American intelligence agencies. The resistance was organized into small cells that generally had no contact with each other and were assigned very specific missions to carry out. According to one source, most resistance cells were focused on three primary missions: (1) the production of propaganda or, rather, counter- propaganda (leaflets, pamphlets, newspapers, defacing `official' propaganda etc.); (2) intelligence/information gathering for the Special Operations Executive (SOE) in London and the American OSS; (3) and building escape networks, facilitating the escape of Allied servicemen, resisters and, later in the war, Jews. If you are interested in learning more about the resistance movement in occupied Europe, check out this reading list.
I've been getting into stories and histories of the resistance movement that developed in European countries under Nazi occupation during World War II. If you want to read about bravery and heroism, that is one era to study. So, let's say a country was defeated by Germany, France for example, and the Nazi's took over, installed a puppet government and life went on. What did average people do? How did they learn to resist? Did the resistance movement spring up on it's own? How would your average civilian population know the strategies and tactics best suited to a resistance movement? As it turns out, the resistance movement in most conquered European countries had plenty of help from the British and American intelligence agencies. The resistance was organized into small cells that generally had no contact with each other and were assigned very specific missions to carry out. According to one source, most resistance cells were focused on three primary missions: (1) the production of propaganda or, rather, counter- propaganda (leaflets, pamphlets, newspapers, defacing `official' propaganda etc.); (2) intelligence/information gathering for the Special Operations Executive (SOE) in London and the American OSS; (3) and building escape networks, facilitating the escape of Allied servicemen, resisters and, later in the war, Jews. If you are interested in learning more about the resistance movement in occupied Europe, check out this reading list.
Feedback
I'm getting some feedback, which is good, keep it coming. What is a Hassid? A few entries back I'd mentioned something about Hassid, a reference to David Hassid, a character in the later Left Behind novels. If you are just starting the series you will not have met him yet, but you will. David is the ultimate information technology (IT) guy, knows everything about computers, networks, communications, etc. I'm adopting references to the characters in the books as a sort of general convention, a short hand for the different talents and skills that would go into a well rounded TF group. I'm not sure the writers had that in mind when choosing the characters, but it seems clear that any group is going to have a leader (Rayford Steele), a field agent (Buck Williams), an administrator (Chloe Steele), an IT officer (David Hassid), webmaster/outreach (Tsion Ben-Judah and Buck), and other assorted agents (Mac McCullum, Annie Christopher, Leah Rose, etc.). Ok, so you get the idea. This is not to say that every TF group will have the same grouping of talents, but that is the general outline. The books imply that there are other TF groups other than the core group the books center on, and that they comprise a loose network, but that Steele's group is the HQ of the resistance. And, yes, I do have a firm grip on reality. This web page is an interesting fusion of fiction, present reality and potential futures. Take from it what you will, for what it's worth.
I'm getting some feedback, which is good, keep it coming. What is a Hassid? A few entries back I'd mentioned something about Hassid, a reference to David Hassid, a character in the later Left Behind novels. If you are just starting the series you will not have met him yet, but you will. David is the ultimate information technology (IT) guy, knows everything about computers, networks, communications, etc. I'm adopting references to the characters in the books as a sort of general convention, a short hand for the different talents and skills that would go into a well rounded TF group. I'm not sure the writers had that in mind when choosing the characters, but it seems clear that any group is going to have a leader (Rayford Steele), a field agent (Buck Williams), an administrator (Chloe Steele), an IT officer (David Hassid), webmaster/outreach (Tsion Ben-Judah and Buck), and other assorted agents (Mac McCullum, Annie Christopher, Leah Rose, etc.). Ok, so you get the idea. This is not to say that every TF group will have the same grouping of talents, but that is the general outline. The books imply that there are other TF groups other than the core group the books center on, and that they comprise a loose network, but that Steele's group is the HQ of the resistance. And, yes, I do have a firm grip on reality. This web page is an interesting fusion of fiction, present reality and potential futures. Take from it what you will, for what it's worth.
The Timex Internet Messenger
Suppose you are sending your people into the field on an especially dangerous mission, one in which they will be traveling light, extremely light, with only the clothes on their backs, no baggage at all. How can you stay in touch? A connected watch might be the answer. According to Yahoo Internet Life's Cool Tools review, this new and improved version of the Timex Internet Messenger is 28% smaller and $60 cheaper than its predecessor, it can deliver news, stocks, weather, e-mail and serves as a one-way pager. Receives up to 16 Internet e-mail, numeric or word messages of up to 100 characters each. Comes with FlexTime, a feature that automatically sets and maintains time, date and time zone changes. Service is provided by SkyTel for $10 and up. Of course, it has standard features you would also expect a watch to have, like a stopwatch, 5 alarms, countdown timer, and Indigo backlight, all in the standard Timex Ironman Triathlon style.
Suppose you are sending your people into the field on an especially dangerous mission, one in which they will be traveling light, extremely light, with only the clothes on their backs, no baggage at all. How can you stay in touch? A connected watch might be the answer. According to Yahoo Internet Life's Cool Tools review, this new and improved version of the Timex Internet Messenger is 28% smaller and $60 cheaper than its predecessor, it can deliver news, stocks, weather, e-mail and serves as a one-way pager. Receives up to 16 Internet e-mail, numeric or word messages of up to 100 characters each. Comes with FlexTime, a feature that automatically sets and maintains time, date and time zone changes. Service is provided by SkyTel for $10 and up. Of course, it has standard features you would also expect a watch to have, like a stopwatch, 5 alarms, countdown timer, and Indigo backlight, all in the standard Timex Ironman Triathlon style.
Texas Town Opens Cybercafe on Bush Visit
Cybercafes are an excellent resource for your field agents. Equipped with web mail accounts, your operatives can check in from almost any major metropolitan area, and even from remote Crawford, Texas, site of the Western White House.
Cybercafes are an excellent resource for your field agents. Equipped with web mail accounts, your operatives can check in from almost any major metropolitan area, and even from remote Crawford, Texas, site of the Western White House.
Terrorism Possible Motive in Creation of Computer Worm Virus
Don't discount the possibility that GC forces may use computer viruses to target the underground church. Can viruses be focused on one or a few targets? They can certainly be crafted to scan networks, which provide easy access, and thus can infect many linked computers at the same time. If one computer in a network is vulnerable, the entire network is vulnerable. Your Hassid should make sure all your TF computers have antivirus software and the latest definitions and patches.
Don't discount the possibility that GC forces may use computer viruses to target the underground church. Can viruses be focused on one or a few targets? They can certainly be crafted to scan networks, which provide easy access, and thus can infect many linked computers at the same time. If one computer in a network is vulnerable, the entire network is vulnerable. Your Hassid should make sure all your TF computers have antivirus software and the latest definitions and patches.
Thursday, August 09, 2001
Security Firms Call for Video Surveillance Law
It looks as if a backlash is well underway against the use of video surveillance and the face-scanning system called FaceIt.
It looks as if a backlash is well underway against the use of video surveillance and the face-scanning system called FaceIt.
Wednesday, August 08, 2001
Taliban Say Evidence Mounts Against Aid Workers
Asked why Christians today would be worried about security of any kind. Reply, just look at what is happening to those international aid workers in Afghanistan, where anyone found trying to convert Afghan Muslims to Christianity -- or anyone who converts -- faces the death penalty under the Taliban's strict interpretation of Islamic Sharia law.
Asked why Christians today would be worried about security of any kind. Reply, just look at what is happening to those international aid workers in Afghanistan, where anyone found trying to convert Afghan Muslims to Christianity -- or anyone who converts -- faces the death penalty under the Taliban's strict interpretation of Islamic Sharia law.
FBI Must Reveal Computer Snooping Technique - Judge
An interesting development in the DOJ vs. Scarfo case. A judge has ruled that the government must reveal exactly how it bugged the mobsters computer. As you may know, the first entry in the TFT blog had to do with e-mail encryption, and the fact that the mobster was using PGP, a free program you can download over the net. The program works so well that no matter who accesses the e-mail or intercepts it any stage of the journey from sender to receiver, they can't read it without the secret scrambled "key." The FBI didn't have that and there was no way to get it, so they had to bug the computer, specifically the keyboard, with a recorder that monitored each keystroke. Whether the bug was software or hardware is not known, and that is one of the things the court said the government had to reveal. Very interesting, stay tuned.
An interesting development in the DOJ vs. Scarfo case. A judge has ruled that the government must reveal exactly how it bugged the mobsters computer. As you may know, the first entry in the TFT blog had to do with e-mail encryption, and the fact that the mobster was using PGP, a free program you can download over the net. The program works so well that no matter who accesses the e-mail or intercepts it any stage of the journey from sender to receiver, they can't read it without the secret scrambled "key." The FBI didn't have that and there was no way to get it, so they had to bug the computer, specifically the keyboard, with a recorder that monitored each keystroke. Whether the bug was software or hardware is not known, and that is one of the things the court said the government had to reveal. Very interesting, stay tuned.
Tuesday, August 07, 2001
Interception Capabilities 2000
Has your local Trib Force been compromised? Are you being spied on? Are you even familiar with the many ways GC forces can spy on you? This report details potential surveillance methods used to spy via high frequency radio and microwave relays, subsea cables, and communications satellites; also has a section that addresses the Echelon system. From IPTV.
Has your local Trib Force been compromised? Are you being spied on? Are you even familiar with the many ways GC forces can spy on you? This report details potential surveillance methods used to spy via high frequency radio and microwave relays, subsea cables, and communications satellites; also has a section that addresses the Echelon system. From IPTV.
Monday, August 06, 2001
Hackers Developing Anti-Censorship Software
Imagine this, hackers as the good guys...really. On one side, you have countries (the UAE, Saudi Arabia, Myanmar, China and North Korea) that block access to web sites they deem to be politically, socially or spiritually subversive, on the other side, you have hackers, stepping in to save the day. How? By working on software, called ``Peekabooty,'' designed to circumvent the filters that block access to Web sites by going around them, using a distributed privacy network, according to this Reuters news article. Volunteers from all over the world are working on the project, which they hope will be of use to human rights workers in countries that are not known for valuing human rights, countries that are also hostile to Christians and missionary efforts. So, have your Hassid keep an eye out for this software, according to this article, it can save lives (and just maybe help win souls).
Imagine this, hackers as the good guys...really. On one side, you have countries (the UAE, Saudi Arabia, Myanmar, China and North Korea) that block access to web sites they deem to be politically, socially or spiritually subversive, on the other side, you have hackers, stepping in to save the day. How? By working on software, called ``Peekabooty,'' designed to circumvent the filters that block access to Web sites by going around them, using a distributed privacy network, according to this Reuters news article. Volunteers from all over the world are working on the project, which they hope will be of use to human rights workers in countries that are not known for valuing human rights, countries that are also hostile to Christians and missionary efforts. So, have your Hassid keep an eye out for this software, according to this article, it can save lives (and just maybe help win souls).
Sunday, August 05, 2001
Rugged Notebooks
So, you have taken the time to secure your e-mail and computer files, but now your safehouse is compromised and you need to hit the road fast. Is your laptop up to the task? RuggedNotebooks.com is a company specializing in providing durable computers and equipment for those who need to operate in the field under diverse and perhaps adverse conditions. The computers are expensive, but they can take a beating. No Trib Force cell should be without one.
So, you have taken the time to secure your e-mail and computer files, but now your safehouse is compromised and you need to hit the road fast. Is your laptop up to the task? RuggedNotebooks.com is a company specializing in providing durable computers and equipment for those who need to operate in the field under diverse and perhaps adverse conditions. The computers are expensive, but they can take a beating. No Trib Force cell should be without one.
E-Mail Cloaking
After doing a bit more research since posting the last entry, I've found that although PGP is extremely popular, it's not very user friendly. Thankfully, there are alternatives that may allow those who are not familiar with the tech stuff to make their e-mail secure. According to Yahoo Internet Life's Lou Dolinar, "Hushmail.com, a free Web-based service, provides a powerful yet simple encryption solution for Net neophytes. The site scrambles all outgoing messages and claims it can guard against everything from office snoops to the FBI's information-gathering Carnivore software. If you'd like to lock up old e-mails or any other file on your computer, try using Cryptext. This free PC-only program can password-protect your data with a simple right-click of the mouse."
After doing a bit more research since posting the last entry, I've found that although PGP is extremely popular, it's not very user friendly. Thankfully, there are alternatives that may allow those who are not familiar with the tech stuff to make their e-mail secure. According to Yahoo Internet Life's Lou Dolinar, "Hushmail.com, a free Web-based service, provides a powerful yet simple encryption solution for Net neophytes. The site scrambles all outgoing messages and claims it can guard against everything from office snoops to the FBI's information-gathering Carnivore software. If you'd like to lock up old e-mails or any other file on your computer, try using Cryptext. This free PC-only program can password-protect your data with a simple right-click of the mouse."
Saturday, August 04, 2001
Judge to DOJ: Explain Spy Method
This Wired News article describes the methods the FBI used to arrest a suspected mobster. What is interesting is that the mobster was using an e-mail encryption program so sophisticated, they could not break the code without first getting his password. In order to do that, they had to physically install a bug on his computer that recorded the keystrokes made on his keyboard. If you think that such a sophisticated encryption program would be very expensive and not available to the general public, you would be wrong. The program in question is called PGP, which stands for Pretty Good Privacy, and it's available for free on the net. So, if you find yourself in need of secure e-mail, check out PGP. The only drawback is that both sender and receiver must be using PGP, but other than that, it works as advertised, just ask the FBI.
This Wired News article describes the methods the FBI used to arrest a suspected mobster. What is interesting is that the mobster was using an e-mail encryption program so sophisticated, they could not break the code without first getting his password. In order to do that, they had to physically install a bug on his computer that recorded the keystrokes made on his keyboard. If you think that such a sophisticated encryption program would be very expensive and not available to the general public, you would be wrong. The program in question is called PGP, which stands for Pretty Good Privacy, and it's available for free on the net. So, if you find yourself in need of secure e-mail, check out PGP. The only drawback is that both sender and receiver must be using PGP, but other than that, it works as advertised, just ask the FBI.
Welcome
This web page is called the Trib Force Toolkit, and is dedicated to providing links to resources for the Christian underground, both today and in the future. Inspired by the Left Behind series of end times novels, this web page hopes to equip believers for their battle against the forces of darkness. Regardless of your eschatology, you will find here links to products, organizations and resources that will help believers accomplish their mission behind enemy lines. Even today, there are believers being persecuted in repressive governments all over the world. Believers in China, Saudi Arabia, Egypt, Indonesia, India, Malaysia, Russia, Afghanistan, and Sudan will find here tools that may be of immediate help. We know that at all times, we have spiritual resources available to fight the enemy, but sometimes the Lord provides technology in answer to a prayer, and this web page will highlight some of that technology. Fight the good fight!
home - email - im
This web page is called the Trib Force Toolkit, and is dedicated to providing links to resources for the Christian underground, both today and in the future. Inspired by the Left Behind series of end times novels, this web page hopes to equip believers for their battle against the forces of darkness. Regardless of your eschatology, you will find here links to products, organizations and resources that will help believers accomplish their mission behind enemy lines. Even today, there are believers being persecuted in repressive governments all over the world. Believers in China, Saudi Arabia, Egypt, Indonesia, India, Malaysia, Russia, Afghanistan, and Sudan will find here tools that may be of immediate help. We know that at all times, we have spiritual resources available to fight the enemy, but sometimes the Lord provides technology in answer to a prayer, and this web page will highlight some of that technology. Fight the good fight!
home - email - im
Subscribe to:
Posts (Atom)