SDN has moved again!
Subscribe to our RUMBLE channel
Brief
Conduct a series of techniques and procedures to counter forensics and surveillance when making a purchase of a product you desire not to be connected with in order to avoid unconstitutional prosecution or operational security.
Physical Purchases
Physical purchases (those made in person) should be made with cash as the capabilities to monitor digital forms of payments are ever evolving. Methods to remove traces of the purchase to yourself should be implemented. The goal is to separate space and time to avoid connection to the purchase.
》Buy outside of the city/county you reside in as well as those that neighbor you.
》Purchases should be made by a trusted third party if possible.
》Your vehicle should not be parked near the purchase location and your phone should not be carried with you during the purchase (this is done to avoid post-investigative actions that could reveal your license plate or cross reference geo-location.
》The buyer should conceal their identity (medical mask, makeup, physical-form altering clothing or padding).
》The items purchased should not be used/employed within 60 days of purchase (as most businesses overwrite previous video recordings every 1 week to 60 days).
Online Purchases
Online purchases limit the use of cash as a payment method so semi-secure credit card (CC) variants may need to be used. Cryptocurrencies, for the well-versed buyer, also remain a semi-secure option.
One CC option is the Virtual Credit Card which generates a random account number and a new token that is used to verify a given transaction. Designed to circumvent data breaches, maintain anonymity, or limit purchases. Another CC option is a “Static, Non-Reloadable CC (Gift Card): where no account or credit is needed, can be purchased with cash. So long as the point-of-purchase of the gift card variant is done securely (cash purchase), this is a great option for anonymity.
Steps for High Security Purchases
For the purchase of goods itself follow these steps:
》Buy a device from a retailer using cash while taking all previously mentioned precautions. Don’t buy from a service provider or retailer that requires PII.
》Unbox, leave device powered off. Insert a microphone blocking plug. Place an adhesive camera blocker over the front and rear cameras, (duct tape, foil tape, etc).
》Disable all invasive features such as device error logging, GPS, NFC, bluetooth, location sharing, health tracking functions, etc. Delete all bloatware apps.
》Go to a public WiFi access. Power on the device. Setup/use a VPN. Setup accounts using a new email address and false persona info.
》Make purchase online. Use false persona info to create accounts. Mail-to address should preferably be a ghost (unconnected to buyer) location (see our Ghost Mailing Hip Pocket Brief in Vol 2).
》Pow…[REDACTED]
This is an excerpt from the Hip Pocket Briefing Vol 3. Get the pocket size booklet here.
This article was originally written by the Grayman Briefing. Stay in the know. Sign up for Intel and Situational Awareness alerts pushed to your phone on emerging threats and preparedness warnings. Click HERE to subscribe to the Grayman Briefing.
=====
Become a Survival Dispatch Insider …
We bring together survival enthusiasts and preppers to share skills and knowledge, so you can enhance your preparedness for emergencies and ensure the safety of you and your community.
The Results You’ll Get …
Our community, courses, and memberships are pretty special. We focus on the ways it will make a huge difference in your life.
Here are a few of the things you’ll be able to do as a member of Survival Dispatch Insider …
1) Improve your emergency preparedness by learning survival skills and strategies from experienced preppers.
2) Build lasting connections with like-minded individuals that share your passion for safety and readiness.
3) Access a wealth of knowledge and resources to assist in protecting you and your community during unexpected situations.
Click HERE to get started.
=====