Keep Our Service Free-Donate

Tuesday, January 7, 2020

Dems Hint at WWIII, 3 Cyber Threats US Face-Resources to Fight Back

Poor Man Survival

Self Reliance tools for independent minded people…


ISSN 2161-5543

A Digest of Urban Survival Resources


Dems Hint We’re Headed for WWIII; 3 Cyber Threats the US Faces-Resources to Fight Back

   Anti-American Dems in Congress and their Hollywood Communist followers appear to have sided with terrorism and have largely condemned Trump’s actions at taking out a known murderer [Soliemani] of at least 600 US citizens.

Pelosi and newly elected ex-CIA twit from MI want to introduce a War Powers curtailment Bill to be used against Trump as a result.

It would seem Democrats have adopted as their new motto “America Last!”

After all, who needs terrorists when we have domestic Democrats to undermine America?  Plus, China has already met with the leaders of Iraq promising them military aid should they need it to fight America!



Sick: Democrat Slotkin Says She Watched Soleimani Kill Her “Friends And Colleagues” But She Helped Keep Him Alive Anyway... Read the latest now on


… from Secretary of State Mike Pompeo:

"We didn't send pallets of cash to the Iranians. We didn't pay for hostages. We didn't create a deal which would have given them a clear pathway to a nuclear weapon. We have taken a very different approach.”

Amen to that.

I can tell you that almost everyone in the IC (intelligence community) was beyond stunned when Obama thought it was a good idea to give them $400 million in cold, hard cash.

I’m glad we now have a President who isn’t as afraid of other countries as Obama was.

   Virtually no high ranking military individual I know thinks the elimination of this terrorist was a bad idea; few think war is inevitable. 

Our feature article:

As the Nation’s risk advisor, CISA is sharing this to ensure you consider how increased geopolitical tensions and threats of aggression might affect you—such as retaliatory cyber and physical attacks. As you read these insights, we hope they assist in how you look at yourself, your facilities, and your operations from the outside-in. Knowing how you may be exposed or targeted will help you to be better prepared (to act, collaborate, and report).

Today, the Cybersecurity and Infrastructure Security Agency (CISA) issued a CISA Insights document entitled, “Increased Geopolitical Tensions and Threats” pertaining to the increased tension with Iran. You can read the new CISA Insights at

Additional information:

3 Biggest Cyber Threats We Will See in 2020


One of the most concerning corporate data breaches in 2019...
Was of the American Medical Collection Agency, a massive health care debt collector.
The AMCA is a New York based company that collects debt for a broad range of businesses, including medical labs, hospitals, telecom companies and state and local traffic/toll agencies.
The company discovered that it had been breached in March, but indicated that the intrusion had actually lasted from August 2018 through March 2019.
The breach was first publicly reported at the beginning of June...
After the medical testing company LabCorp said that 7.7 million of its customers had data exposed because of AMCA and Quest Diagnostics said it had had records from 12 million patients exposed as well.
According to AMCA, the compromised information included first and last names, dates of birth, phone numbers, addresses, dates of medical services, health care providers and data on balances due.
The major problem is AMCA contracted with so many companies, it's possible that additional companies and their patients were affected as well and they don’t even know it.
To add insult to injury, AMCA filed for bankruptcy, blaming the huge expenses of notifying all the affected consumers and the loss of business because of the breach.
ACMA claimed it learned of the breach after a significant number of credit cards people used to pay their outstanding medical bills via the company’s site ended up with fraud charges on them soon after.
The fact is, it’s no secret that cyber criminals are attacking us on a daily basis and this will only increase in 2020.
In 2018, cybercrime generated at least $1.5 trillion in revenue.
In fact, social media-enabled cyber crimes alone generated $3.25 billion in global revenue.
In the first six months of 2019, 4.1 billion records were exposed via data breaches.
Not surprisingly, 85% of companies reported experiencing phishing and social engineering attacks.
In addition, spending on cybersecurity safety is anticipated to surpass $1 trillion by 2021 and cybercrime damages are anticipated to cost $6 trillion per year by 2021.
Unfortunately, cyber-crime is only going to occur more often.
With that being said, I want to share with you the biggest cyber security threats we will see in 2020.
This will help you prepare now to upgrade your computer security or improve any other measures you can take to hopefully avoid being the victim of a cyber crime.
Cloud services being targeted. From to 2019 to 2021, it is predicted that the amount of data stored in the cloud will increase 100x.
Cloud storage providers must be diligent in ensuring they protect their systems, especially when customers are moving data to the cloud as this is when data is commonly compromised.
If you are looking for a new cloud storage provider I would use an encrypted service such as SpiderOak, Pcloud or Tresorit.
No matter what company you use make sure your password is unique and that you use two-factor authentication to log in.
Faster speeds for criminals. 5G cellular data is rolling out across the world.
The year 2020 will see a rise in the adoption of 5G, however, it may end up being the catalyst for unprecedented data theft.
The problem is, with 5G technology, cyber criminals will be able to deliver malicious software at faster speeds, mostly in major cities.
In addition, we should expect to see new types of “voishing” attacks, making voice calls a new weapon for cyber criminals.
5G is going to expand coverage areas all around the world, meaning more people, including more cyber criminals, will have ways to target their victims.
Elections. In 2020, we can expect to have a hotly contested Presidential election.
There is no doubt we are going to be inundated with fake news and efforts to continuously generate a sense of chaos.
There will be untold attempts to discredit candidates and push an inaccurate political process, which is the primary threat to our democracy.
Plus, it’s likely that we will see an increase in the targeting of state and local voter databases with a goal of creating voting havoc and triggering voter fraud.
Election hacking is not new for 2020, but it will be one of the biggest cyber targets in 2020, especially from foreign adversaries.
The biggest weakness of our cyber security is the human element.
Even the best anti-virus software or best security protocols in the world can’t stop you from opening that infected e-mail or answering the strange phone call from your Uncle in Nigeria.
So, if you aren’t doing so yet, make sure you always use a unique password, install a VPN (Virtual Private Network) on your computer, and don’t answer a phone call that comes from another country.
Also, as I mentioned earlier, have two-factor authentication on everything.
(For instance, if you need to login to your bank, have them either text you or call you with a login code.)
In light of the current tensions between the Islamic Republic of Iran and the United States and Iran’s historic use of cyber offensive activities to retaliate against perceived harm. Foremost, CISA recommends organizations take the following actions:
  1. Adopt a state of heightened awareness. This includes minimizing coverage gaps in personnel availability, more consistently consuming relevant threat intelligence, and making sure emergency call trees are up to date.
  2. Increase organizational vigilance. Ensure security personnel are monitoring key internal security capabilities and that they know how to identify anomalous behavior. Flag any known Iranian indicators of compromise and tactics, techniques, and procedures (TTPs) for immediate response.
  3. Confirm reporting processes. Ensure personnel know how and when to report an incident. The well-being of an organization’s workforce and cyber infrastructure depends on awareness of threat activity. Consider reporting incidents to CISA to help serve as part of CISA’s early warning system (see Contact Information section below).
  4. Exercise organizational incident response plans. Ensure personnel are familiar with the key steps they need to take during an incident. Do they have the accesses they need? Do they know the processes? Are your various data sources logging as expected? Ensure personnel are positioned to act in a calm and unified manner.
Recommended Actions
The following is a composite of actionable technical recommendations for IT professionals and providers to reduce their overall vulnerability. These recommendations are not exhaustive; rather they focus on the actions that will likely have the highest return on investment. In general, CISA recommends two courses of action in the face of potential threat from Iranian actors: 1) vulnerability mitigation and 2) incident preparation.
  1. Disable all unnecessary ports and protocols. Review network security device logs and determine whether to shut off unnecessary ports and protocols. Monitor common ports and protocols for command and control activity.
  2. Enhance monitoring of network and email traffic. Review network signatures and indicators for focused operations activities, monitor for new phishing themes and adjust email rules accordingly, and follow best practices of restricting attachments via email or other mechanisms.  
  3. Patch externally facing equipment. Focus on patching critical and high vulnerabilities that allow for remote code execution or denial of service on externally facing equipment.
  4. Log and limit usage of PowerShell. Limit the usage of PowerShell to only users and accounts that need it, enable code signing of PowerShell scripts, and enable logging of all PowerShell commands.
  5. Ensure backups are up to date and stored in an easily retrievable location that is air-gapped from the organizational network.

Thanks to Jason Hansen for this important information…

Yours for a Socialist-Free America!

Bruce ‘the Poor Man’




Tech columnist Geoffrey Fowler is mad as heck and he's not going to take it anymore. In his column in the Washington Post, he describes the findings of his year-long research project into privacy - "Learning how everyday things spy on us made me, at times, feel paranoid. Mostly, my privacy project left me angry." 

Despite Amazon CEO Jeff Bezos also owning his employer, the Post, Fowler didn't hold back from critiquing the company and its Alexa technology. If you were on the fence about whether technology has become creepy, Fowler's column will push you off.

How we survive the surveillance apocalypse

Online privacy is not dead, but you have to be angry enough to demand it.

America is a land of plenty and Americans are used to having plenty — plenty of food, plenty of water, plenty of everything. Most of them can't imagine not being able to go to the store to get food of some sort. A survival mindset truly takes vision and planning for the future, especially now.

I hazard to guess that fewer than 10 percent of the readers of this bulletin could live more than a few days and certainly not more than a couple of weeks if something happened to the food supply chain. A long-term interruption due to power grid failure, attack, earthquake, storm or other unexpected event would set them on the road to dehydration or starvation from want of food and water, or injury and death while fighting in the streets over scraps.

Preparedness is something that we must do before we need it. Think now, if we needed stored food today, it would be too late.


How much can I spend for different things?

Hilarious! Maxine Waters Gets Duped In Prank Call By Fake Greta Thunberg Promising Dirt On Trump

Find more wiggle room in the budget.
These small financial changes can equal big financial success

I've written about scavenging before. It's a little bit controversial because some people view it as stealing. The way I see it, if an item no longer has an owner, then finders keepers.

 However, how can you know for sure whether the item has an owner? What if it's a situation where the owner plans on returning to the city after the disaster has passed?

 On the other hand, what if it's a situation where most people in the city have died? Is the owner of that car across the street from your house dead, or is there a chance he'll come back. These are the types of questions you'll have to ponder...


Free enterprise, limited government, individual freedom!


Contributors and subscribers enable the Poor Man Survivor to post 150+ free essays annually. It is for this reason they are Heroes and Heroines of New Media. Without your financial support, the free content would disappear for the simple reason that I cannot keep body and soul together on my meager book sales & ecommerce alone.

You Can’t Buy Life Insurance After You’re Dead

Not Prepared? 

That's Bad News...


Find Preparedness books and other useful items below! New Items Added!

Support our efforts by shopping my storefront…



A Smoking Frog Feature, Shallow Planet Production


Sam said...

Listened to talk radio all day [haven't done that in awhile] and 99% support Trump's move-100% feel the Dems are idiots/traitors & if Obama had done this, they would have cheered...Obama never asked permission from Congress to hit Libya nor Clinton w/ his action in the Balkans! Dems are two-faced hypocrites.

Mandy said...

tremendous resources for cyber security-thanks!

Paul said...

Well done!