Sunday, May 29, 2016

"The oral administration of sodium bicarbonate diminishes the severity of the changes produced by uranium in the...

Originally shared by Justin Case

"The oral administration of sodium bicarbonate diminishes the severity of the changes produced by uranium in the kidneys."
-- The Journal of Experimental Medicine, Vol 25, 693-719 The Rockefeller Institute for Medical Research New York

Sodium bicarbonate can safely remove paint, grease, oil and smoke residue, decreasing workers’ exposure to harsh chemicals and eliminating much of the hazardous waste associated with other cleaners. "Sodium bicarbonate is able to clean in areas where other substances pose fire hazards, because baking soda is a natural fire extinguisher," says Kenneth Colbert, a general manager for Arm & Hammer. This is the reason it’s used by oncology centers to control chemo agent spills and its actually used intravenously to protect patients from the hazardous toxicity of chemotherapy.
http://drsircus.com/medicine/sodium-bicarbonate-baking-soda/reducing-radiation-damages-with-bicarbonate

Saturday, May 28, 2016

Tips For Choosing Reliable, Privacy-Friendly Apps - GreyCoder


https://greycoder.com/tips-for-chosing-reliable-privacy-friendly-apps/

A Complete Guide To Privacy Online - GreyCoder


https://greycoder.com/privacy-roadmap/

Using Mailvelope to Keep Emails Private with PGP Encryption - GreyCoder


https://greycoder.com/using-mailvelope-to-keep-emails-private-with-pgp-encryption/

PRIVATEGRITY PROMISES BETTER, FASTER ONLINE PRIVACY THAN TOR

PRIVATEGRITY PROMISES BETTER, FASTER ONLINE PRIVACY THAN TOR
https://greycoder.com/privategrity/

USING JONDONYM’S PROXY SERVICE FOR ONLINE PRIVACY

USING JONDONYM’S PROXY SERVICE FOR ONLINE PRIVACY
https://greycoder.com/using-jondonyms-proxy-service-for-online-privacy/

Malware: The State Of The Threat In 2016 - GreyCoder


https://greycoder.com/malware-important-2016/

Riseup: Private Email For Activitists and Those Being Censored

Riseup: Private Email For Activitists and Those Being Censored
Riseup provides private and secure email, mailing lists and chat services for individuals and organization
https://greycoder.com/riseup-secure-email-need-avoid-censorship/

Could Email Provide Access to Censored Online Content? - GreyCoder


https://greycoder.com/email-provide-access-censored-online-content/

CounterMail: A Diskless, Encrypted Email Service - GreyCoder

Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/countermail-a-diskless-pgp-encrypted-email-service/

Two Free Privacy-Focused Mobile Operating Systems - GreyCoder


https://greycoder.com/two-free-private-mobile-operating-systems/

How To: Configure Windows 10 Privacy Settings - GreyCoder


https://greycoder.com/how-to-configure-windows-10-privacy-settings/

WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES

Originally shared by Government GangStalking and Electronic Harassment

WICKR: SEND SELF-DESTRUCTING, ENCRYPTED MESSAGES

Wickr is a free app for the iPhone that allows you to send self-destructing, private instant messages to your friends. You can send text messages, video and audio messages. The whole transmission process is private — even the Wickr app developers cannot read the message, because they are encrypted before they leave your device.
https://greycoder.com/wickr/

THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS

Originally shared by Government GangStalking and Electronic Harassment

THREE FREE ANTI-KEYLOGGING APPS FOR WINDOWS

Keyloggers are one of the most effective ways for hackers to steal private information. Here are some solutions for preventing keyloggers from compromising your Windows system.

Keyloggers come in two forms — those that are software-based and those that are embedded in hardware. The latter can only be installed by someone who has physical access to your computer, but the former could be placed on your system remotely through, for example, a malicious software download.

Once installed, keyloggers record every key stroke you make. Some also take screenshots to track what you click. They can then upload this information to any destination on the Internet.

Keyloggers can be hard to detect, but you can install software designed to thwart them. Most anti-keylogger programs work by intercepting key strokes at the system level and encrypting them before they reach a specific application. That way, if someone is monitoring your key strokes, the information he sees will be an encrypted jumble.

You can pay lots of money for anti-keylogger software, but a number of free solutions also exist, including the following:

Zemana: Designed for easy setup and protects all applications, not just the Web browser (as some other free anti-keyloggers do). The basic software is free but a paid premium version adds anti-malware services.
SpyShelter: Offers tools to prevent webcam and microphone hijacking in addition to comprehensive anti-keylogging.
NextGen AntiKeylogger: Easy installation, although the developers don’t provide a lot of details about how exactly the anti-keylogging feature works.

It goes without saying that the best way to prevent keylogging is to protect yourself from malicious software in the first place so that a keylogging package can’t install itself on your system. But if you want extra protection, a free anti-keylogging program can’t hurt.
https://greycoder.com/10450-2/

Prism Break provides a well-researched list of software that can help you opt of of surveillance.

Prism Break provides a well-researched list of software that can help you opt of of surveillance.

Help make mass surveillance of entire populations uneconomical! We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services.

FOR:

MOBILE
COMPUTERS
NETWORKS
https://prism-break.org/en/

The Best Privacy-Friendly Apps & Services For 2016 - GreyCoder


https://greycoder.com/essential-privacy-services/

How To: Make Your Android Device More Private - GreyCoder


https://greycoder.com/how-to-make-your-android-device-more-private/

How To: Perform Private Searches Online - GreyCoder


https://greycoder.com/how-to-perform-private-searches-online/

How To: Use HTTPS Everywhere for Browser Privacy - GreyCoder


https://greycoder.com/how-to-use-https-everywhere/

How To: Protect Your Privacy on Usenet - GreyCoder


https://greycoder.com/how-to-protect-your-privacy-on-usenet/

How To Make Windows 10 More Private - GreyCoder


https://greycoder.com/how-to-make-windows-10-more-private/

How To Make Flash More Private - GreyCoder


https://greycoder.com/how-to-make-flash-more-private/

How To: Maximize Cloud Storage Data Privacy - GreyCoder


https://greycoder.com/how-to-store-data-securely-in-the-cloud/

How to Use Encryption Effectively on Android Phones - GreyCoder


https://greycoder.com/how-to-encrypt-your-android-phone-or-tablet/

FBI Used U.S. University to Attack Tor Privacy - GreyCoder

Originally shared by Government GangStalking and Electronic Harassment
https://greycoder.com/fbi-tor/

New Encryption Attack Can Steal Android and iOS Data - GreyCoder


https://greycoder.com/11328-2/

Mouse Movements Could Identify Tor Users' Real IP Address - GreyCoder


https://greycoder.com/mouse-movements-identify-tor-users-real-ip-address/

Two Useful Guides To Software Alternatives - GreyCoder


https://greycoder.com/useful-lists-privacy-friendly-software/

A Review Of Anonymous Credit Cards


If you WANT TO BUY SOMETHING ANONYMOUSLY WITH A CREDIT CARD

You can get a Vanilla Visa or Simon card, See this article for more information.
http://greycoder.com/vanilla-visa-an-inexpensive-anonymous-credit-card/
http://greycoder.com/vanilla-visa-an-inexpensive-anonymous-credit-card/

DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?

DO YOU WANT TO USE BITTORRENT ANONYMOUSLY.?

TRY ONE OF THE VPN SERVICES ON THIS LIST
WHICH CAN COME IN HANDY IF YOU
WANT TO VISIT BLOCKED/CENSORED WEBSITES

DO LEARN:
HOW TO GET BETTER VPN SPEEDS AND PERFORMANCE
https://greycoder.com/vpn-speed/

AND ALSO IF YOU
WANT TO KEEP HACKERS AWAY WHILE I TRAVEL AND USE WIFI HOTSPOTS.--- HERE YOU CAN ALSO USE a password manager like Lastpass.

KEEP IN MIND THAT
VPN TRAFFIC CAN BE DECRYPTED THROUGH JUNIPER BUG
https://greycoder.com/10795-2/

ALSO DO NOTE ;

1- Privatoria

With prices starting as low as $1.90 per month, Privatoria offers one of the least expensive commercial VPN services for people who want to browse anonymously or circumvent online censorship. Here’s a look at its features, installation process and bandwidth speeds.
https://greycoder.com/review-of-privatorias-vpn-service/


2-THE BEST FREE AND LOW-COST VPN SERVICES FOR 2016
https://greycoder.com/best-free-and-low-cost-vpn-services-for-2016/

3-THE BEST FREE VPN TRIALS OF 2016
by Grey One • July 30, 2014
https://greycoder.com/best-free-vpn-trials/

4-A REVIEW OF NORDVPN FOR 2016
NORDVPN IN A NUTSHELL
NordVPN is an easy-to-use VPN service that provides several advanced features. These include anti-DNS leaking, Tor over VPN, “double encryption” and auto-shutdown of your Internet connection if the VPN connection breaks. The service’s pricing plans are competitive easy to understand. It has excellent installation instructions overall, although they could be better for Linux. Performance is generally good, but it can be slow on certain servers.
https://greycoder.com/nordvpn-review/

5-ExpressVPN has released a client for Linux! Under my tests, it appears to be a reliable application. It runs via the terminal, and allows you to choose switch VPN locations.
https://www.expressvpn.com/blog/expressvpn-app-for-linux/ (ExpressVPN for Linux Is Here and It’s Totally Awesome!
By Brad - April 1, 2016)
https://www.expressvpn.com/

6-PandaPow has released a plug-and-play VPN box for use in China.
https://pandapow.co/wifi/

7-PROXY.SH ANONYMOUS VPN SERVICE REVIEW
https://greycoder.com/proxy-sh-vpn-review/

8-PRIVATE INTERNET ACCESS VPN REVIEW
https://greycoder.com/private-internet-access-vpn-review/

9-IPVANISH LAUNCHES IPHONE APP
https://greycoder.com/ipvanish-launches-iphone-app/

10-THE BEST VPN PROVIDERS THAT OFFER DEDICATED IPS
https://greycoder.com/best-vpn-providers-offering-static-ips/

FINALLY, IF YOU WANT TO USE BITTORRENT ANONYMOUSLY REMEMBER THAT YOU CAN ALSO join Usenet
https://greycoder.com/the-best-usenet-providers/

BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/

ALSO SEE LINK BELOW FOR MORE INFO ON USENET
https://plus.google.com/+GovernmentGangStalkingandElectronicHarassment/posts/LpmNdAPBEoS
https://greycoder.com/best-vpn-service/

WANT MORE ANONYMITY — I WANT TO USE AN ENTIRE ANONYMOUS OPERATING SYSTEM

WANT MORE ANONYMITY — I WANT TO USE AN ENTIRE ANONYMOUS OPERATING SYSTEM

do not use only one

remember this
http://greycoder.com/anonymous-linux-distributions/
https://tails.boum.org/

INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.

INTERESTED IN A PRIVATE ALTERNATIVE INTERNET.
See Usenet. ?

BUT REMEMBER
HOW TO: PROTECT YOUR PRIVACY ON USENET
https://greycoder.com/how-to-protect-your-privacy-on-usenet/

If you are tech savvy, try Freenet or I2P.
Surf their info here , in the posted article

ALSO NOTE THE HELPFUL ARTICLES HERE:

1-THE BEST USENET CLIENT OF 2016
https://greycoder.com/best-usenet-client/

2-THE BEST FREE USENET SERVERS 2016
https://greycoder.com/best-free-usenet-servers/

3-THE BEST FREE USENET TRIALS OF 2016
https://greycoder.com/best-free-usenet-trials/

4-EASYNEWS NOW PROVIDES 1900 DAYS OF USENET
https://greycoder.com/easynews-now-provides-1900-days-usenet/
https://greycoder.com/the-best-usenet-providers/

Friday, May 27, 2016

DIFFERENT TAKES

DIFFERENT TAKES
https://www.reddit.com/r/Gangstalking/comments/3k70ap/counter_measures_by_targetedindividuals/

Linux Distributions Built For Anonymity - GreyCoder


https://greycoder.com/anonymous-linux-distributions/

A List Of Email Providers That Don't Track You - GreyCoder


https://greycoder.com/private-email-providers/

Using Anonymous Remailers for Email Privacy - GreyCoder


https://greycoder.com/remailers/

The 3 Minute Guide To Online Privacy - GreyCoder


http://greycoder.com/what-type-of-privacy-are-you-interested-in/

10 Incredibly Simple Things You Should Be Doing To Protect Your Privacy


http://www.forbes.com/sites/kashmirhill/2012/08/23/10-incredibly-simple-things-you-should-be-doing-to-protect-your-privacy/#3df9baf02da1

How to use the internet in a post-prism world - Slashgeek


http://www.slashgeek.net/2013/06/30/how-to-use-the-internet-in-a-post-prism-world/

How to be completely Anonymous online - Slashgeek


http://www.slashgeek.net/2012/06/15/how-to-be-completely-anonymous-online/

worthy of re-post

worthy of re-post
https://fightgangstalking.com/tactics-for-fighting-back/

Survival Guide - Targeted Individuals 101


https://sites.google.com/site/targetedindividuals101/survival-guide

Targeted Individuals - Andy Lewis


http://www.targeted-individuals.com/#/counter-measures/4568113474

Tuesday, May 24, 2016

READ THIS PART VERY CAREFULLY

READ THIS PART VERY CAREFULLY

BECAUSE IT REFERS TO BRAIN WAVE SIGNATURE TRACKING EVASION

DO NOTE THAT WE ARE BEING TRACKED BY 4 METHODS THAT I KNOW OF AS OF NOW:

1-BRAINWAVE SIGNATURE TRACKING
2-CARDIAC SIGNATURE TRACKING -SEE OTHER POSTS FOR THAT
3-RFID CHIP IMPLANTATION TRACKING
4-CELLPHONE TRACKING

I HEARD AND READ OF TRACKING US BY REMOTELY ACTIVATING A LOJACK TYPE PARTIAL INSTALLATION IN OUR LAPTOPS BUT I DO NOT KNOW MUCH ABOUT THIS NOW. IN ADDITION, THE NEW LAPTOPS HAVE A BUILT IN BATTERY AND THIS, AS I WAS TOLD, ENABLES THE SAME TYPE OF TRACKING AS THE CELLPHONES.

I WILL HAVE MORE INFO ON THESE SUBJECT MATTERS IN THE FUTURE WHEN I DO RESEARCH ON THEM.

IF ANYONE ALREADY HAS KNOWLEDGE ABOUT THESE MATTERS THEN PLEASE DO SHARE FOR THE COMMON GOOD AND FOR THE COMMON BENEFIT FOR ALL.

ALSO SEE

http://www.bibliotecapleyades.net/scalar_tech/esp_scalartech12.htm

Detecting EMF Fields in Humans for Surveillance

A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are.

With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance. NSA personnel can dial up any individual in the country on the Signals Intelligence EMF scanning network and the NSA's computers will then pinpoint and track that person 24 hours a day.

The NSA can pick out and track anyone in the US.
Show less
http://www.bibliotecapleyades.net/ciencia/ciencia_matrix57k.htm

Two Brief Videos You Must Watch To Fully Appreciate The Danger We're In of Having Our Natural Biology Replaced By...


http://ymlp.com/zBoD99

International Advocates for Health Freedom: Two Brief Videos You Must Watch To Fully Appreciate The Danger We’re In...


https://everydayconcerned.net/2015/08/19/international-advocates-for-health-freedom-morgellons/

How to Spot COINTELPRO Agents


http://www.bibliotecapleyades.net/esp_cointelpro07.htm

How to Detox/Get Rid of the Nanotechnology From Chem Trails in Your Body


https://everydayconcerned.net/2016/04/03/how-to-detoxget-rid-of-the-nanotechnology-from-chem-trails-in-your-body/

READ THIS PART CAREFULLY:

Originally shared by Government GangStalking and Electronic Harassment

READ THIS PART CAREFULLY:
https://everydayconcerned.net/2015/08/13/holistic-doctors-sudden-cardiac-arrest-targeted-individuals-remote-radiation-heart-attack-weaponry-how-to-protect-yourself/

Sunday, May 22, 2016

READ THIS PART IN EEG CLONING SECTION:

Originally shared by Government GangStalking and Electronic Harassment

READ THIS PART IN EEG CLONING SECTION:

"Americans are being selected for disposal, no indictment, no trials, no jury. Go directly to torture and death sentence. Thousands of Americans are deliberately being murdered after being selected for “total access”. They are slandered out of their employment which leads to losing their homes, losing everything through a Nazi-like selection process. The death sentence is in these programs: Morgellons, Radiation and Gangstalking."
https://authenticmentoring.wordpress.com/2015/12/21/hell-on-earth-being-created-by-dod-sentient-world-simulation-and-eeg-cloning/

A Clever Way to Tell Which of Your Emails Are Being Tracked


http://www.wired.com/2015/03/ugly-mail/

How to Protect Self from a Supercomputer Electronic Gulag


https://authenticmentoring.wordpress.com/2015/11/08/electronic-gulag-jade-helms-integration-and-roll-out-of-powerful-ai-technologies-electronic-targeting-of-dissidents-total-population-control-and-genocide/

The Killer Grid: Scalar, Gwen Towers and Nexrad Infrasound Pulses – The “Hum”, The “Rumble” and “Booms” = Population...


https://authenticmentoring.wordpress.com/2015/02/17/gwen-towers-and-nexrad-infrasound-pulses-the-hum-the-rumble-and-booms-population-control/

How To Protect Yourself from Wireless Radiation


http://www.radiationeducation.com/How_To_Protect_Yourself.html

Sunday, May 8, 2016

TIs sharing shileding tips

TIs sharing shileding tips
http://peacepink.ning.com/profiles/blogs/shielding-tips-www-freedomfchs-com
Title

You can’t stop the NSA from tracking you, but you can make it harder


https://www.abine.com/blog/2013/stop-the-nsa-from-tracking-you/

Protection from Mind Control Weapons

Originally shared by Government GangStalking and Electronic Harassment
http://www.jacobsm.com/projfree/protection.html

Shielding for Directed Energy


http://www.countertruth.com/shielding.html

Explore crimes involving Organized Surveillance, Electronic Harassment, Directed Energy Weapons and Remote...


http://www.countertruth.com/the-crimes.html

Microwave Technology And Its Use Against Humanity


http://assassinationscience.com/EMP5.htm

Lone Star Consulting, Inc. Ultrasound/Infrasound Subliminal,Mind Control,Entrainment,Electronic Attack

Originally shared by Government GangStalking and Electronic Harassment
http://www.lonestarconsultinginc.com/mindcontrol2.htm

Solutions

Originally shared by Government GangStalking and Electronic Harassment
http://www.stopthecrime.net/flyers.html

Wednesday, May 4, 2016

Protection from Mind Control Weapons


http://www.jacobsm.com/projfree/protection.html

DIY Faraday Shield: Protection from Stalkers Using Mil Spec FLIR Cameras and from EMP Storms » Reach Unlimited


http://reach-unlimited.com/p/933254228/diy-faraday-shield--protection-from-stalkers-using-mil-spec-flir-cameras--and-from-emp-storms

Defense Against Freemason Sponsored Electronic Harassment, page 1


http://www.abovetopsecret.com/forum/thread323067/pg1

Electronic Technological Harassment Research Information For Victims (Huge Post) in Electronic Technological...

Originally shared by Government GangStalking and Electronic Harassment
http://osinformers.lefora.com/topic/16267059/Electronic-Technological-Harassment-Research-Information-Vi#.VyqlblUrKM8

Guide to Defeating Mind Control Systems - The Gear You NEED!


http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_mindcon60.htm

Female Target of Electronic Harassment and Stalking Offers Ideas on Mitigation & Protection (Sept. 30, 2014)


http://educate-yourself.org/lte/gigiletter28sep14.shtml

A TI's take on dew shielding

A TI's take on dew shielding
https://sites.google.com/site/thetargetedtruth/targetprotection

VERY IMPORTANT INFORMATION

VERY IMPORTANT INFORMATION
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3vt3qa/wiki_dew_detection_using_meters_spectrum/

DEW: Detection using meters, spectrum analyzers, thermal imaging and infrared cameras apps

ALSO SEE
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3r0klf/wiki_lasers_including_new_infrared_laser_electric/
https://www.reddit.com/r/TargetedEnergyWeapons/comments/3vt3qa/wiki_dew_detection_using_meters_spectrum/

Technology


http://www.psychologicalharassment.org/technology

INSIDE THIS DOCUMENT SEARCH FOR THE TERMS "DIRECTED ENERGY WEAPONS" AND YOU WILL GET INFORMATION ABOUT THESE...

INSIDE THIS DOCUMENT SEARCH FOR THE TERMS "DIRECTED ENERGY WEAPONS" AND YOU WILL GET INFORMATION ABOUT THESE CAMERAS' ABILITY TO DETECT THEM
http://www.flir.com/uploadedFiles/Thermography_USA/Products/Product_Literature/flir-infrared-cameras-for-research-and-science-brochure.pdf

THEY ARE HERE TOO

THEY ARE HERE TOO

LOOK FOR THE BETTER ONES IF YOU WANT TO DETECT LASER ATTACKS
https://play.google.com/store/apps/details?id=com.fingersoft.thermalvisioncamera&hl=en

how-to turn a digital camera into an IR-camera :: projects :: geek technique


http://www.geektechnique.org/projectlab/254/how-to-turn-a-digital-camera-into-an-ir-camera.html

Microwave and Terahertz wave sensing with

Microwave and Terahertz wave sensing with
metamaterials
http://people.bu.edu/xinz/pdf/Opt_Exp-2011_19_21620-21626.pdf

IF YOU CAN AFFORD THEM, YOU CAN DOCUMENT MICROWAVE LASER ATTACKS

IF YOU CAN AFFORD THEM, YOU CAN DOCUMENT MICROWAVE LASER ATTACKS


MORE OF THESE CAMERAS HERE
http://www.ferret.com.au/ODIN/PDF/Showcases/22182.pdf

AND HERE (THESE HAVE THERMAL SENSORS)
http://www.videal.ch/files/documents/thermal-imaging-cameras-with-thermal-sensor.pdf
http://www.naffco.com/downloads/pdf/flir-2013-catalogue-en.pdf

Infrared Detection Devices Facts, information, pictures | Encyclopedia.com articles about Infrared Detection Devices


http://www.encyclopedia.com/topic/Infrared_Detection_Devices.aspx

Silent Sentinel - Thermal Imaging Surveillance Cameras


http://www.silentsentinel.com/thermal-imaging-cameras.html

Blog Home Page


http://www.flir.com/FLIRNews/

VERY IMPORTANT

VERY IMPORTANT
http://www.azosensors.com/Article.aspx?ArticleID=654
http://www.azosensors.com/Article.aspx?ArticleID=654

Тепловизионные камеры FLIR SC7000 Orion


https://www.youtube.com/watch?v=z-A0HtY4Mdw

VERY IMPORTANT INFORMATION/PRODUCTS/FORUM

VERY IMPORTANT INFORMATION/PRODUCTS/FORUM

http://electronicharassment.freeforums.net/thread/29/spectral-analysis-cameras-laser-detection
http://electronicharassment.freeforums.net/thread/29/spectral-analysis-cameras-laser-detection

Techniques for Countering Thermal Imaging Devices


http://mail.blockyourid.com/~gbpprorg/mil/thermal/index.html

Personal Drone Detection System Unveiled To Protect You From Unwanted Surveillance (video)


http://www.geeky-gadgets.com/personal-drone-detection-system-unveiled-to-protect-you-from-unwanted-surveillance-13-06-2014/

Sky Fighter: Meet the Man Who Wants to Drone-Proof Your Home


http://gizmodo.com/sky-fighter-meet-the-man-who-wants-to-drone-proof-your-600375084

Worried about spying? Maybe you need a personal drone detection system | Technology | The Guardian


https://www.theguardian.com/technology/2014/jun/19/spying-personal-drone-detection-system-kickstarter

You Can Now Build a Drone Detection System - The Official Newegg Blog


http://blog.newegg.com/tired-drones-flying-head-build-drone-detection-system/

Al Qaeda's 22 Tips For Avoiding Drone Detection


http://www.businessinsider.com/al-qaedas-22-tips-to-avoid-drone-detection-2013-2

Privacy Apocalypse: 5 Devices You Can’t Hide From

Originally shared by Government GangStalking and Electronic Harassment
http://www.survivopedia.com/devices-that-you-cant-hide-from/

LEARN FROM IT

LEARN FROM IT
https://www.youtube.com/watch?v=jRPMLQ1_l14

rageuniversity.com/PRISONESCAPE/EVASION%20OUTSIDE%20PRISON/DEFEATING%20INFRA%20RED%20AND%20THERMAL%20IMAGING%20DEVICE...


http://rageuniversity.com/PRISONESCAPE/EVASION%20OUTSIDE%20PRISON/DEFEATING%20INFRA%20RED%20AND%20THERMAL%20IMAGING%20DEVICES.pdf

Amazon.com: FLIR Scout PS24 Heat Sensing Thermal Imaging Camera: Sports & Outdoors


http://www.amazon.com/FLIR-Sensing-Thermal-Imaging-Camera/dp/B005J2KJFU/ref=as_li_ss_tl?s=sporting-goods&ie=UTF8&qid=1438028764&sr=1-1&keywords=flir&linkCode=sl1&tag=uscrow-20&linkId=597b9f4cec74786d3b9a36006cc370f9

How to effectively avoid FLIR and Aerial Detection


https://uscrow.org/2013/01/01/how-to-avoid-effectively-avoid-fliraerial-detection/

How To Hide From Drones


https://www.youtube.com/watch?v=8s_vT1P5mHo

Hiding From Thermal Imaging


https://www.youtube.com/watch?v=d1BDJ0_nN4A

Defeat Thermal Imaging and Surive Modern Warfare


https://www.youtube.com/watch?v=k5ABNeK0k6w

Eye of the Drones: Evading and Avoiding Thermal Imaging


https://www.youtube.com/watch?v=9PLo5iCEcX4

How To Hide From Drones, 4 Rules Of Property Protection, The Sig Brace, and MORE! THPN


https://www.youtube.com/watch?v=7VtG3UJGm20

How to Hide from Drones/Thermal Imaging » TinHatRanch


http://tinhatranch.com/hide-dronesthermal-imaging/#.VyqNMFUrKM8

Defeating Drones: How To Build A Thermal Evasion Suit


https://www.youtube.com/watch?v=VnptcYpuHXs

How Long To Boil Drinking Water?


http://modernsurvivalblog.com/health/how-long-to-boil-drinking-water/

ALSO SEE

ALSO SEE
http://www.amazon.com/gp/product/B000GCRWCG/ref=as_li_ss_tl?ie=UTF8&camp=1789&creative=390957&creativeASIN=B000GCRWCG&linkCode=as2&tag=modesurvblog-20
http://modernsurvivalblog.com/preps/uses-for-a-space-blanket-emergency-blanket-thermal-blanket/

7 Ways How To Hide From Drones


http://modernsurvivalblog.com/security/7-ways-how-to-hide-from-drones/

How To Block IR Infrared Thermal Imaging


http://modernsurvivalblog.com/security/how-to-block-ir-infrared-thermal-imaging/

Camouflage and Evasion: Staying Hidden While on the Move - Preparing for shtf


http://prepforshtf.com/camouflage-evasion-staying-hidden-move/