Cryptocurrency Risks

Cryptocurrency – “a digital currency in which encryption techniques are used to regulate the generation of units of currency and verify the transfer of funds, operating independently of a central bank” (Source: Dictionary.com).

What is Cryptocurrency: Everything You Need To Know [Ultimate Guide]

Cryptocurrency is the hot item right now with millennials and investors, but the buyer must be aware that it is not as safe as advertised. If you watch the news, you will see that many of these bitcoin exchanges have been hacked by sophisticated hackers. The latest one happened in Japan.

Bitcoin uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of bitcoins is carried out collectively by the network. Bitcoin is open-source; its design is public, nobody owns or controls Bitcoin and everyone can take part. Through many of its unique properties, Bitcoin allows exciting uses that could not be covered by any previous payment system.these are some other interested crypto exchanges.

Besided Bitcoin, there are 6 more to look at.

1) Litecoin (LTC)

Litecoin, launched in the year 2011, was among the initial cryptocurrencies following bitcoin and was often referred to as ‘silver to Bitcoin’s gold.’ It was created by Charlie Lee, a MIT graduate and former Google engineer. Litecoin is based on an open source global payment network that is not controlled by any central authority and uses “scrypt” as a proof of work, which can be decoded with the help of CPUs of consumer grade. Although Litecoin is like Bitcoin in many ways, it has a faster block generation rate and hence offers a faster transaction confirmation. Other than developers, there are a growing number of merchants who accept Litecoin.

2) Ethereum (ETH)

Launched in 2015, Ethereum is a decentralized software platform that enables Smart Contracts and Distributed Applications (ĐApps) to be built and run without any downtime, fraud, control or interference from a third party. During 2014, Ethereum had launched a pre-sale for ether which had received an overwhelming response. The applications on Ethereum are run on its platform-specific cryptographic token, ether. Ether is like a vehicle for moving around on the Ethereum platform, and is sought by mostly developers looking to develop and run applications inside Ethereum. According to Ethereum, it can be used to “codify, decentralize, secure and trade just about anything.” Following the attack on the DAO in 2016, Ethereum was split into Ethereum (ETH) and Ethereum Classic (ETC). Ethereum (ETH) has a market capitalization of $41.4 billion, second after Bitcoin among all cryptocurrencies. (Related reading: The First-Ever Ethereum IRA is a Game-Changer)

3) Zcash (ZEC)

Zcash, a decentralized and open-source cryptocurrency launched in the latter part of 2016, looks promising. “If Bitcoin is like http for money, Zcash is https,” is how Zcash defines itself. Zcash offers privacy and selective transparency of transactions. Thus, like https, Zcash claims to provide extra security or privacy where all transactions are recorded and published on a blockchain, but details such as the sender, recipient, and amount remain private. Zcash offers its users the choice of ‘shielded’ transactions, which allow for content to be encrypted using advanced cryptographic technique or zero-knowledge proof construction called a zk-SNARK developed by its team. (Related reading, see: What Is Zcash?)

4) Dash

Dash (originally known as Darkcoin) is a more secretive version of Bitcoin. Dash offers more anonymity as it works on a decentralized mastercode network that makes transactions almost untraceably. Launched in January 2014, Dash experienced an increasing fan following in a short span of time. This cryptocurrency was created and developed by Evan Duffield and can be mined using a CPU or GPU. In March 2015, ‘Darkcoin’ was rebranded to Dash, which stands for Digital Cash and operates under the ticker – DASH. The rebranding didn’t change any of its technological features such as Darksend, InstantX. (Related reading, see: Top Alternative Investments for Retirement)

5) Ripple (XRP)

Ripple is a real-time global settlement network that offers instant, certain and low-cost international payments. Ripple “enables banks to settle cross-border payments in real time, with end-to-end transparency, and at lower costs.” Released in 2012, Ripple currency has a market capitalization of $1.26 billion. Ripple’s consensus ledger — its method of conformation — doesn’t need mining, a feature that deviates from bitcoin and altcoins. Since Ripple’s structure doesn’t require mining, it reduces the usage of computing power, and minimizes network latency. Ripple believes that ‘distributing value is a powerful way to incentivize certain behaviors’ and thus currently plans to distribute XRP primarily “through business development deals, incentives to liquidity providers who offer tighter spreads for payments, and selling XRP to institutional buyers interested in investing in XRP.”

6) Monero (XMR)

Monero is a secure, private and untraceable currency. This open source cryptocurrency was launched in April 2014 and soon spiked great interest among the cryptography community and enthusiasts. The development of this cryptocurrency is completely donation-based and community-driven. Monero has been launched with a strong focus on decentralization and scalability, and enables complete privacy by using a special technique called ‘ring signatures.’ With this technique, there appears a group of cryptographic signatures including at least one real participant – but since they all appear valid, the real one cannot be isolated.

Read more: The 6 Most Important Cryptocurrencies Other Than Bitcoin? | Investopedia https://www.investopedia.com/tech/6-most-important-cryptocurrencies-other-bitcoin/#ixzz55V23Y4mJ

 

The BigEasy GLO Lockout Toolkit

If you have ever locked yourself out of your car, this tool is very helpful. The Big Easy is good for law enforcement, security or the average citizen. Keep one at home and in another car and save on hiring a locksmith to come unlock your car. The instructions are simple too. Buy it from Galls!

BigEasy GLO Lockout Tool Kit

Watch the video to see how and works –

Learn to Read People

I love playing Texas Holdem poker and getting any advantage I can. These two books help me with reading people at the poker table, but they can also help you in to determine what the person you are talking to is thinking. Enjoy these books – you can get them at Barnes and Noble or Amazon. I paid $8 bucks each for them at B&N discount section.

How to read a person like a book WEBIS

Defend Yourself from the “Lone Wolf” Attack

Lone Wolf attacks have been happening all over the world. Defending yourself against a lone wolf attack may be difficult or even impossible, but you have to do something to prepare regardless. Below are some video techniques that might help you survive this type of attack.

What is the “Lone Wolf”?

Wikipedia defines it as:

“A loterror-homelandne wolf or lone-wolf fighter is someone who commits or prepares for, or is suspected of committing or preparing for, violent acts in support of some group, movement, or ideology, but who does so alone, outside of any command structure and without material assistance from any group.”

In the U.S. legal context, the lone wolf is associated with the U.S. terror-law FISA, bearing in mind that U.S. terror-law comprises non-violent, as well as violent acts. Moreover, a lone wolf can be so defined on the mere basis of suspicion (“reasonable belief”, not actual charges). Probable cause is not required.”

Knowing your environment is key to surviving one of these attacks – they can come out of no where.

The biggest thing is being situationally aware of your environment. The next thing is to have the right training to fight back – be it self-defense courses (MMA, BJJ, Judo, Wrestling, Boxing, etc) or handgun use.

Omar Mateen, Lone-Wolf Terrorist (Click)

thumb3-1024x436

Keep Your Head on a Swivel

Cooper’s colors: A simple system for situational awareness

cooper-color-code

Timeline of LonAPTOPIX Canada Shootinge Wolf Terrorist Attacks 

June 2009: Abdulhakim Mujahid Muhammad shoots and kills a soldier outside Arkansas recruiting station, claiming retribution for the killing of Muslims by American troops in Iraq and Afghanistan.

November 2009: U.S. Army psychiatrist Major Nidal Malik Hasan kills 13 people at Fort Hood, Texas, saying he was driven by a hatred of American military action in the Muslim world.

February 2010: U.S. Pilot Andrew Joseph Stack III deliberately crashes his aircraft into a building in Austin, Texas, killing himself and one other. He posted a suicide note expressing displeasure with the “greed” of the U.S. government.

March 2011: Frankfurt airport shooting of two U.S. Airmen by Arid Uka, a devout Muslim who says he was radicalized by jihadist propaganda videos.

July 2011: Norwegian extremist Anders Breivik kills 77 people in a bomb attack in Oslo and a shooting spree on the island of Utøya to highlight his far-right beliefs.

March 2012: Mohammed Merah kills seven people (including three soldiers) in Toulouse, France. Merah said he was inspired by al-Qaeda.

April 2013: Dzhokar Tsarnaev and Tamerlan Tsarnaev kill 3 people, injure more than 260 at the Boston Marathon. Dzhokar said the brothers were motivated by extremist Islamist beliefs.

May 2013: Two British-born converts to Islam, Michael Adebolajo and Michael Adebowale attack and kill a British soldier in London.

May 2014: Mehdi Nemmouche opens fire at the Jewish Museum of Belgium in the center of Brussels, killing 4 people. He is believed to have spent over a year in Syria with radical Islamists.

September 2014: An Oklahoma man with a criminal history, Alton Nolen, beheads a female co-worker after being fired. Authorities said Nolen had recently converted to Islam.

October 2014 : Canadian soldier dies in a hit-and-run in Quebec by Martin Rouleau-Couture. Two days later, another Canadian soldier is shot dead in Ottawa, allegedly by Michael Zehaf-Bibeau, a man with a criminal record. Reports say both terrorists had recently converted to Islam. (Source: Time)

Lone Wolf via FoxNews

Clearing your home –

 

Close Quarter Shooting Techniques – 

Human  Weapon Techniques

 Biblical Self Defense

Homeland Security Snapshot – December

The Homeland Security Committee just released this visual product and I am cheering all the way bank. They get the threat of terrorism.

12.10.15

CHAIRMAN MCCAUL RELEASES DECEMBER TERROR THREAT SNAPSHOT

WASHINGTON, D.C. – The December Terror Threat Snapshot was released today by House Homeland Security Committee Chairman Michael McCaul. The “snapshot” is a monthly assessment of the Committee’s continuing efforts to highlight the growing threat America, the West, and the world face from ISIS and other Islamist terrorists.

Earlier this week, Chairman McCaul delivered his inaugural State of Homeland Security Address at the National Defense University, Ft. McNair in Washington, D.C. McCaul discussed the rise of radicalism, terror threats to the United States, and America’s role in winning the war against Islamist terror during his address. See video of his remarks, here.

Chairman McCaul: “The state of our homeland is increasingly not secure and I believe 2015 will be seen as a watershed year in this long war. ISIS sympathizers in San Bernardino executed the deadliest Islamist terror attack on American soil since 9/11 last week. European ISIS fighters returning from the battlefields of Syria conducted a massacre on the streets of Paris in the worst attack in France since World War II. President Obama’s failure to lead in confronting this threat has left us vulnerable and our enemies emboldened. What we need in this moment is a global strategy to win the war against Islamist terror – not more lectures and half measures.”

Key takeaways in this month’s Terror Threat Snapshot include:

  • ISIS and its supporters are engineering a global terror campaign against the West, including here in the United States where they executed the deadliest Islamist terror attack on American soil since 9/11. ISIS has now directed or inspired 66 plots to attack Western targets, including 19 inside America. ISIS sympathizers conducted the recent attack in San Bernardino less than three weeks after ISIS operatives struck in Paris.
  • The failure to destroy ISIS resulted in an unprecedented Islamist terror threat level here at home this year. Authorities have arrested more than one ISIS-linked individual every week, on average, in 2015. ISIS-related cases have been opened in all 50 states and account for the majority of the nearly 1,000 active homegrown extremist investigations.
  • ISIS and al Qaeda’s global expansion is spawning jihadist incubators from Yemen to Libya. ISIS has established a Libyan affiliate that is steadily consolidating its stranglehold on territory and drawing foreign recruits. In Yemen, al Qaeda in the Arabian Peninsula (AQAP) has capitalized on the ongoing war there to seize territory and bolster the ranks of its supporters.
  • Foreign fighters operating on jihadist battlefields are a surging threat to Americans and our allies, as demonstrated in the November 13 Paris attack. The ISIS attack plot in France was executed by mostly French and Belgian militants, some of whom had traveled to Syria and infiltrated Europe using the cover of refugee and migrant flows.
  • Islamist terrorists have attempted to infiltrate the United States through the refugee resettlement program since 2011. The National Counterterrorism Center has identified “…individuals with ties to terrorist groups in Syria attempting to gain entry to the U.S. through the U.S. refugee program.”
  • The transfers of Guantanamo terror detainees overseas and, potentially, to the homeland threaten Americans and broader U.S. national security interests. Nearly one in three detainees released from the facility are known – or are suspected – to have rejoined Islamist terror groups, including a former detainee who now recruits for ISIS in Pakistan. County sheriffs in Colorado warned President Obama in November that moving Guantanamo detainees onto U.S. soil, which is prohibited but which the President has threatened to force through executive action, would endanger American communities.
  • Iran is posed to receive economic sanctions relief from the West despite plotting terror attacks against Western interests, employing cyber weapons to target American government personnel, conducting illicit ballistic missile tests, stonewalling UN inspectors, and stockpiling missiles threatening Israel. The Obama Administration is preparing to ease sanctions on Iran, the world’s leading state sponsor of terrorism whose sectarian policies are a key enabler for ISIS and al Qaeda’s recruitment.

TerrorThreatSnapshot_December_Social Media

The complete December Terror Threat Snapshot is available, here.

View the Committee’s interactive Terror Threat Snapshot map, here.

Enjoy Freedom

Don’t let terrorism warnings ruin your 4th of July celebrations. Go out and blow up some fireworks and have a cookout. Freedom is not free, it costs in blood and sacrifice.

4th-July-Freedom-Quotes-02930 fourth-of-july-wallpapers

But if you do find yourself in a situation that requires self-defense. By all means defend!!

2008-10-12-warning-in-case-of-terrorist-attack

Firework Safety – don’t do these things!

Defense Driving Techniques

Learning how to drive in any type of weather is essential, but learning how to be a defensive driver is something totally different. Getting out of a dangerous situation is key to survival and knowing how to drive fast, J-Turns, and PIT maneuvers will save your life.

Click here to Learn How to Drive Fast

Ultimate Speed Secrets

 

Learn how to do a J-Turn

PIT Maneuver

How to Drive Fast

I-Racing Basic

I-Racing Basic

The Marine Corps Martial Arts Program (MCMAP)

Learn what the U.S. Marine Corps uses to defend themselves against adversaries. They use a program that teaches them how to fight in many different situations.

Marines demonstrate Corps tactics, principles

From Wikipedia

The Marine Corps Martial Arts Program (MCMAP, /ˈmɪkmæp/) is a combat system developed by the United States Marine Corps to combine existing and new hand-to-hand and close quarters combat (CQC) techniques with morale and team-building functions and instruction in the Warrior Ethos. The program, which began in 2001, trains Marines (and U.S. Navy personnel attached to Marine units) in unarmed combat, edged weapons, weapons of opportunity, and rifle and bayonet techniques. It also stresses mental and character development, including the responsible use of force, leadership, and teamwork.

Click on here to see the manual!

mcmap

 

MCMAP1insigniaMCMAP-Disciplines

 

Learn Knife Self-Defense

The knife should be a part of your defense plan. Every weapon is needed to defend against those trying to harm you.

Watch the video first from Jim Wagner and then look at the picture below to get the angles down.

Note: Audio is a little bad, but the training is good.

Jim Wagner Knife Defense

 

 

For more on Jim Wagner Reality-Based Training click here!