Off Grid Cell Phone Communication in Emergencies – Roampod Could be the Solution

If you have a smart phone, what will you do when a major disaster knocks out the cell towers? If only there were some way for off grid cell phone communication in emergencies.

Roampod could be the solution. You can find out about it on this week’s DestinySurvival Radio. I share a conversation with Nik Kitson, cofounder of Roampod.


My Smart Phone Disconnect

I confess. I don’t have a smart phone. And I seldom use the little cell phone I do have. So when you hear my visit with Nik Kitson, you’ll hear your humble host put amazing ignorance out there for all to hear.

But that’s OK. Maybe our Q&A will prove beneficial to others who aren’t up to speed on this stuff.

But how dependent should we as preppers be on today’s technologies anyway?

If you’ve been reading my posts here and listening to DestinySurvival Radio, you know I don’t focus much on technology. I began promoting e-books a few years ago on Amazon’s Kindle only grudgingly. I’ll spare you my opinions on what I believe modern gadgets are doing to us. For now, let me keep the focus on preparedness.

An awfully lot of us are using today’s technologies to our advantage, and that’s great. But in a disaster or survival situation, what do we do when we can’t use our wonderful electronic devices? Will our dependence on our GPS and smart phone apps prove to be detrimental?

On the other hand…

Maybe there will be work arounds that allow you and me to keep using our electronics in ways we’re not now aware of. For example, Roampod may be the solution you need for communicating by cell phone off the grid.

Roampod isn’t quite ready for prime time yet, so to speak; but Nik will explain all that as you listen to our chat. In fact, he explains how you could play a part in making Roampod all it’s meant to be.


I’m Off the Hook

And some would say I’m unhinged, too. But that’s another story.

Seriously, allow me to insert a brief personal disclaimer. I have no affiliate relationship or any other financial connections with Nik Kitson or his company. I’m presenting this information to you for educational purposes.

Roampod is a new thing with great possibilities, but I want to let you know I’m not on the ground floor, promoting some get rich quick opportunity. I am neither endorsing nor discrediting the technologies presented for your consideration today. You assume full responsibility for any purchases of that technology you choose to make.


He Talks Funny for a Texan

Nik told me he’s located in Texas. The Dallas area, if I recall correctly. But you’ll notice he doesn’t have a Texas accent. You’ll understand when you read the following bio blurb.


Nik arrived in the US from New Zealand, where he is an avid windsurfer, snowboarder and outdoors enthusiast. He has been deploying and designing wireless industry for 15 years before co-founding Roampod. The idea behind Roampod is to enable private & secure communications without cellular or Wi-Fi from your smart phone.


Revealing Roampod

Here’s an overview of Roampod. It’s a bluetooth device that you pair up with your smart phone or tablet. It actually consists of two parts–an app and a small, portable device that acts as receiver and transmitter.

Roampod enables you to connect with other Roampod users. It uses a new long range wireless technology which creates what’s called a mesh network. Mesh networking doesn’t use the Internet. It greatly extends the range you can communicate by allowing messages to hop from Roampod to Roampod.

As things stand now, the Roampod app supports two way messaging. You can send location updates and offline maps. Nik’s company plans to add voice messages and other options in future app updates.


Yeah, But What About…?

Privacy and Security – Roampod’s signals are encrypted in such a way that only another Roampod user can decipher them. Several other privacy options exist in settings for using the Roampod device.

Licensing – You don’t need a license to use Roampod, like you would with ham radio or GMRS radios.

Roampod uses millions of channels in a part of the frequency spectrum commonly used by cell phone devices and Wi-Fi. Nik’s company has done what they needed to do to be registered properly with the FCC.

Range – Going from one Roampod to another, you may get up to a mile in an urban area. You may get up to 20 miles outside of the city, depending on terrain. Your message goes a lot further when Roampods connect in the mesh network. Plus, digital signals are clear and static free.

Battery Life – Depending whether you’re listening or doing a little transmitting, the Roampod device may last 3-5 days. Of course, you’ll want to have your cell phone charged as well. You can use the same chargers for Roampod’s batteries as you’d use for your cell phone’s battery.

EMP – Whether Roampod or your cell phone will work depends on the nature of the EMP and whether your devices are on or off.

Jamming – It’s not likely because it would be difficult to do. Nik explains this better in our conversation.

Tracking – When your cell phone is on, it’s tracked. However, it would be almost impossible to track the Roampod device itself.

Target Risk – A friend of mine says terrorists and drug dealers use mesh networks. Does that make you and me a risk if we use Roampod?

Not likely, according to Nik’s explanation. And it sounds to me like he and his company are doing everything openly and above board.

Availability – The off the shelf version of Roampod for consumers is expected to be available this fall or by the end of the year.


Find Out More

This is one of those shows you have to hear to get a more complete picture than what I’ve been able to present here. Therefore, if you want to go deeper, I highly recommend you hear my conversation with Nik Kitson by listening to DestinySurvival Radio for June 18, 2015. (Right click to download).

Also, check out for more info. Sign up for the newsletter to get details on the Kickstarter campaign Nik talked about during our chat.. You have an opportunity to give feedback and save big money on Roampod.

Another way for you to get a quick overview of Roampod is to take a couple of minutes to view the video below this post.

I’d love to know your thoughts. Is Roampod something you’d like to have as part of your prepping supplies? Could you envision your family or prepper group using Roampod when cell towers are out? Why, or why not?




A Ham Radio Operator Talks About Emergency Radio Service After the Joplin Tornado

If you’ve ever been curious about how ham radio operators provide emergency radio service in the aftermath of a disaster, this week’s DestinySurvival Radio will give you an inside look from one man’s experience. My guest was Joe Casler, amateur radio call sign KC0WGB, and later N0JEC.

We talked about his public service in the wake of the massive tornado that obliterated part of Joplin, MO, which took the lives of 162 people on May 22, 2011.

Update – Joe Casler passed away on January 21, 2016. In ham radio circles he’s referred to as a silent key (SK). Our DestinySurvival Radio conversation demonstrates his service-oriented spirit to others. Read on to find out more.


Devastation after Joplin Tornado


Joe was a fellow member of the Central Missouri Radio Association (CMRA), a ham radio club in Columbia, MO. At the July 2013 meeting, Joe gave a talk and slide presentation on his service in Joplin a couple weeks after the tornado blew through. He agreed to do an interview with me for DestinySurvival Radio and share some pictures.

A Point Worth Noting

Let this sink in for a bit. Joe’s services were needed two weeks after the Joplin tornado. The services of the Red Cross, Southern Baptist relief groups and numerous agencies were still required as well.

So often we hear sensational media stories about disasters, but then they fade away. That by no means indicates the troubles and recovery are over. Ask anyone who’s been through Hurricanes Katrina or Sandy. Hundreds of volunteers put in thousands of hours doing nitty gritty logistical tasks on the ground before recovery can begin in earnest.

The point is, for you and me, having a three day kit is barely a beginning. You may find yourself in a situation that calls for weeks of food and supplies. Or you may have to evacuate to a shelter or other temporary housing. Be as ready as you can be, and be as adaptable as you know how to be.

Joe the Ham Radio Operator

Joe became a ham radio operator in 2006 after retirement. A friend talked him into getting licensed. Within a couple of years, he had his Extra Class license, the highest of the three license classes. His experience with public service in the Civil Air Patrol spurred him to public service in ham radio. He was an active member of the local ham radio club.

Messages and Traffic

Without getting too complicated, there’s a structured system ham radio operators use for sending and receiving certain kinds of messages. Messages are referred to as traffic. They’re passed from one ham to another on nets, short for networks.

Messages can be passed on any part of the ham radio frequency spectrum. Joe’s service in Joplin was on 2 meters–frequencies between 144 and 148 MHz. That’s above the FM band on your radio.


Ham radio equipment


Ham radio fills a significant gap during and after emergencies. Cell phones and other technologies we count on can fail or simply not be usable.

The few days Joe spent in Joplin weren’t adrenaline-pumping dramatic. He served as net control operator with SATERN, the Salvation Army Team Emergency Radio Net. He relayed messages related to the functions of canteens on wheels that supplied water, food and other supplies to people in need.


Water drop off


On the Ground

Pictures hint at the devastation left by the monster tornado.


More Joplin Devastation


Debastated trees


The community pulled together to help one another. If there was any looting, it was long over when Joe arrived.

Volunteers came from several hours distance to help out. Joe himself drove about four hours. He said food and accommodations were good, too. The community was very supportive of the efforts done on their behalf.


If you’re interested in becoming involved with ham radio public service efforts, Joe said to get all the training you can. Of course, get your license, which is much easier than it used to be. The groups you serve will appreciate your completion of instruction from ARRL (Amateur Radio Relay League) and FEMA. Relevant links are below.

Once you become a ham, get involved with a local club and any radio nets in your area. Listen, learn, and participate. And make new friends–like Joe.

Find Out More

Hear my interview with Joe Casler by listening to DestinySurvival Radio for August 29, 2013. You’ll find out more than I can share here. Want to know what Joe found to be creepy?

For more info on resources Joe and I referred to, check out the following:

  • Get an overview on the Joplin tornado from Wikipedia here.
  • Info about SATERN can be found here.
  • For info about ARRL, the ARES organization, traffic handling, and public service training as a ham radio operator, go here.
  • Info on FEMA ICS training courses is here.
  • Find other communications related links under Survival Communications in my Links of Interest page.

A Bit of Han Radio Trivia

Joe ended our interview by saying “73.” That’s ham radio lingo for “best regards.” So 73 to you, my reader.


Some iPhone Apps That Could Save Your Life

Most of us as preppers know we need to be ready for the day when modern technology isn’t there. That could happen for any number of reasons. Nonetheless, as long as the technology horse is galloping along, we may as well ride it to the end of the trail, anticipating that the trail will indeed come to anend.

With that in mind, I pass along the following excerpt and link to an article about some iPhone apps that could save your life. I don’t have an iPhone, so I can’t write intelligently about apps. I defer you to those who are knowledgeable about such things.

Keep in mind, availability of apps may have changed since the article linked below was written.

10 iPhone Apps That Could Save Your Life

Whether you have a pre-existing condition or find yourself with a medical emergency, time is always of the essence. When it comes to a matter of life and death, you will want to have as much available help as possible. Thankfully, there are some excellent iPhone apps designed to help in medical emergencies. These 10 apps could save your life, so make sure to install them on your iPhone before it’s too late.

Read the rest of the article here.

Apps mentioned in the article which may be of particular interest to preppers include…

  • Spot a Stroke F.A.S.T.
  • SPOT Connect
  • First Aid
  • !Emergency!
  • FEMA
  • iTriage

The article cited above comes from the Longhorn Leads blog.

If you want to be sure your iPhone is powered up when the power’s out, get what you need by clicking the ad for Goal Zero below.

Shop the Most Innovative Portable Solar Power Products today at Goal Zero. Click Here!


Surviving the Collapse of the Internet – Is the Web Already Broken?

You’re reading my words now because the Internet exists. But as you and I continue to prepare for an uncertain future, we must consider that the Web may not be around one day. Or it could be changed dramatically from what it is now. Either way, our normal routines will be disrupted.

But what about the disruption to society and the economy which the Internet itself has already caused? There’s a bigger picture than the one you and I see every day as we surf online, do our banking, order from Amazon, do Facebook, Twitter, or whatever. The Internet has become a seemingly indispensable part of our social fabric.

George Ure, author of Broken Web: The Coming Collapse of the Internet, talked about these notions yesterday on DestinySurvival Radio. Before the show, Steve, the producer, asked me if George was the author of How to Live on $10,000 a Year – or Less. Yes, he is. But his current book–and related topics–dominated our conversation yesterday.


Curious About George

I’ve been blessed to have a number of guests on DestinySurvival Radio with impressive credentials. George is one such guest. In the next couple of paragraphs, I’m borrowing from bio info he sent me.

He has been a big city radio news director, international airline vice president, college president, software strategist and accomplished sailor. He has an MBA and multiple competencies in flying, sailing, construction, farming, and research.

George takes preparedness seriously and is a drop-out from “big city life.” He now lives with his wife Elaine on a secluded 29-acre ranch in East Texas which features solar panels, a well, a garden and shooting range.


Book Notes

My impression when reading George’s book and a few of his blog posts is that he’s wonderfully negative. He’s not a fear monger, but he has a realistic perspective on larger issues. He brings out things we preppers may not have thought of.

This is important because, as I’ve said numerous times before, we need to know what’s going on in our world. It’s because of that crazy world that we’re prepping, isn’t it?

While George tackles technical issues, I don’t think you’ll be baffled. However, if you miss some of the technical info, you’ll still come away with the overarching concepts he shares. I appreciate his historical perspective. Have we created our own worst nightmare? You’ll get caught up in his book as you read.

Issues he tackles include…

  • Economics, globalism and socioeconomic changes
  • Surveilence and its dangers
  • Viruses, worms and other malware
  • Cyber war and terrorism
  • Systemic vulnerabilities, including EMP threats
  • What the future might look like, including 3D printers and desktop manufacturing
  • Limits of complexity
  • A few solutions for you and me
  • Planning for life without the Internet
  • …and more


Our chat About Big Ideas

The first question I asked George was whether he took Y2K seriously. I was gratified to find that he did. As 2000 rolled in he was on a well supplied sailboat outside Seattle. Nothing noticeable happened then, but that didn’t mean big problems weren’t lurking behind the scenes.

But the problems with Y2K were largely programming and software issues. We face greater, more complex threats today.

One such threat is electromagnetic pulse (EMP). What if it comes from nuclear attack? Or what if it comes in a different form from intense solar activity? Either way, when it’s over and batteries and generators run out of fuel, life will be much different–maybe like the 1800’s.

What’s the greatest threat to the Internet? Could it be a terrorist attack? Or will people back away from the Web because it’s no longer seen as useful or productive? Will people get tired of being spied on by marketers, employers and the government?

Is there an Internet “kill switch?” Why might such a thing be activated? What might happen if it’s used?

Are we too hooked on what George calls “digital cocaine?” Have we become mentally imbalanced? What’s happened to our relationships and morals? Does everything follow a business model of some kind now?

The impact on the labor force is huge. We’ve imported so many jobs overseas because so much can be done online from places like India. And what has been the impact of robotics?

The nature of work has changed. One example is photographs–taking them and distributing them. George and I reminisced about that a few minutes.

Other large questions come to mind. What has happened to the quality of information and news we get when everybody’s broadcasting events to the world by using their smart phones? What about copyright laws and intellectual property infringement?

The Internet has changed our language and how we use words. Can following such changes predict the future?

And in that future, do you have the necessary job skills to survive? What changes will you need to make to your lifestyle to develop and use those skills?


And finally…

George is quick to say he’s not anti-technology. But he is skeptical of where things are headed. And what he does in his greenhouse is more important than what he does on Facebook.

Hear my whole interview with George Ure when you listen to DestinySurvival Radio for December 6, 2012. You get a bonus half hour because we were given the luxury of extending the show. I applaud George for holding forth in spite of recovering from the flu. It’s my hope that he’ll be a guest again in the future because there’s so much more to talk about.

Check out George’s sites at and

George’s book Broken Web: The Coming Collapse of the Internet is a DestinySurvival Pick. He says it’s only meant for people who use the Internet. If you’re reading this, then his book must be for you.

To get your copy, click on its title wherever you see it linked in this post. You’ll be taken to the Amazon page where it’s featured. Add it to your cart to start the order process. It’s a Kindle e-book, but remember, if you don’t have a Kindle, get Kindle for PC free from Amazon.

I’m interested in your comments. Are you preparing for the day when the Internet won’t be around? Or do you hold a more optimistic outlook?



If You Think Your Survival Depends on the Internet…

Editor’s Note: Today marks five years since DestinySurvival first started with a post called What’s in a Name? At that time I wasn’t sure if we’d all still be here in five years. Only God knows whether we’ll be around for the next five.

But my guess is that the Internet won’t be around like it is now after five more years have gone by. The future of the Internet could be affected by ongoing changes in technology. Or it could be wiped out partially or completely by a massive EMP. So if you think your survival depends on the Internet, print all the online articles you find useful from your favorite prepping and survival sites while you still can. Buy printed books for your survival library.

But there are other factors that could change the Web as we’ve known it. It could be heavily regulated or even turned off by the powers that be. Read what Conrad Jaeger has to say below. Draw your own conclusions and feel free to share your thoughts in a comment.

– John


Techtivist Report: A Pivotal Moment for Internet Freedom

By Conrad Jaeger

This may seem far-fetched or even laughable, but the United Nations is planning to take over the Internet.

As news events go, few appear duller at first glance than the scheduled meeting next month in Dubai of the 12th World Conference on International Telecommunications, where delegates will renegotiate the International Telecommunication Regulations.

But look closely, because hidden on the agenda are plans for a little-known U.N. agency that usually concerns itself with telephones and satellite orbits to boost its powers into cyberspace. The International Telecommunications Union (ITU) was set up in 1865 to regulate the mechanical telegraph. Now countries like Russia, China and Saudi Arabia want to see it regulate the Internet and arm it with broad U.N.-backed powers.

These include ensuring the Internet is used for “rational purposes” and not to “interfere in the internal affairs” of other countries. One rule would allow governments to require other countries to monitor Internet traffic on their behalf. Even scarier are proposals for an Internet Tax.

Yet, if that wasn’t bad enough, the telecom giants – in the form of the European Telecommunications Network Operators’ Association – have sought ITU backing to increase costs for users that are likely to retard Internet growth in poorer countries.

“A new international battle is brewing, a battle that will determine the future of the Internet,” warns former Google vice president and so-called “father of the Internet,” Vinton Cerf. “And if all of us – from Capitol Hill to corporate headquarters to Internet cafés in far-off villages – don’t pay attention to what is going on, users worldwide will be at risk of losing the open and free Internet that has brought so much to so many and can bring so much more.”

Among the proposals that have got Cerf and others so worried are plans for centralized control over every facet of online life, from cyber security, data privacy and even technical development, to allowing phone companies, many state-owned, to introduce pay-per-click for access.

There are also proposals to give governments the power to monitor net traffic and dictate how traffic is sent, and to cut off net access to violators. There are also new, broader definitions for spam that could see human rights campaigns blacklisted.

The Dubai meeting will take place behind closed doors and even the agenda is secret. The ITU does not publish any of the proposals put forward by any of the member states, but China is known to have proposed setting up a global register of Internet users linked to their IP addresses.

Unlike the U.N. Security Council, no country can veto ITU proceedings and a simple majority is needed to pass resolutions. As it stands, around 90 of the 193 member states are likely to back the setting up of a U.N. Internet bureaucracy, just seven short of a majority.

“Several authoritarian regimes reportedly would ban anonymity from the web, which would make it easier to find and arrest dissidents,” says Cerf. “Others have suggested moving the privately run system that manages domain names and Internet addresses to the United Nations.”

Under the present system, the Internet is regulated on a “multi-stakeholder” model, meaning different organizations share responsibility, from technical standards to assigning domain names. Many ITU members feel the United States has a disproportionate share of influence over the Internet, both ideologically and commercially, and some would like a share in the profits.

Several governments, many in Africa for instance, would like to see content providers – such as Facebook, YouTube and Google – taxed on a pay-per-click basis to fund Internet expansion in the poorer nations. But there are fears that this could mean less content available in the developing world when sites that refuse to pay are blocked.

Obviously, countries like the U.S. can – and regularly do – ignore the U.N. and there is no reason why any Western democracy needs sign up to a global Internet authority. But the nightmare won’t necessarily stop there. We might then face a great divide among Internet users, with one half of the planet carrying on as before and the other half obeying ITU regulations, leading to separate, tightly controlled, localized Internets, much as we already see in China and soon in Iran – and all under the United Nations’ umbrella of respectability.

“Most people would be shocked to know that something so major could be happening amongst such secrecy,” says Brendan Barber of the International Trade Union Confederation.

“An ITU regulatory regime would give governments the power to restrict the free use of the internet – something that would be a major blow to workers and human rights activists in countries with repressive regimes.

“The issues need to be debated in the light of day and in detail,” he adds, “not rushed through without consultation by a shady coalition of oppressive regimes and vested corporate interests.”


Conrad Jaeger is the author of the inter-active e-books Enter the Dark Net and Deep Web Secrecy and Security published by Deep Web Guides.

This article first appeared in on November 14, 2012.


View other posts featuring Conrad Jaeger here and here.


Internet Privacy – Go Deep, Stay Safe

Editor’s Note: This guest post is by Conrad Jaeger, who is also my guest on DestinySurvival Radio for August 30, 2012.


Use the secrets of the Deep Web to protect you and your family, your private and business interests, your views and your freedoms

News that the FBI has been actively tracking Preppers on-line should be a major cause for concern. When recently warned its readers that the agency had been planting tracking cookies on its website to keep tabs on visitors the news went viral but few people bothered to take elementary precautions to prevent it happening to them.

If you buy large quantities of survival goods, the FBI wants to know about it. Combine that with an interest in firearms and you are likely to be ringing alarm bells all over the place.

And if things are bad now, just wait until the Utah Data Center comes on-stream in 2013 when absolutely everything you say or do on the Internet will be logged and analyzed and used to profile you the way they do in the movie Minority Report.

One might wonder why the FBI and NSA are going to all the trouble of tracking us and storing our data, especially when they are ostensibly trying to catch terrorists, mobsters, illegal downloaders and pedophiles.

As it happens, the bad guys do not use the Internet in any conventional manner to communicate, they employ the secrets of the Deep Web. This is the Parallel Internet, much like the one we know, except the people here are doing everything anonymously. No one knows who they are or where they live. They cannot be tracked or profiled or analyzed. In many ways, this is the Internet’s greatest secret.

They know precisely how to mask their on-line identities and they know how to keep their correspondence hidden. Given that the authorities are well aware of this, a cynic might wonder if there were ulterior motives in wanting to keep such tight tabs on peaceful, law-abiding citizens.

But you don’t need to be up to no good to want to keep your on-line activities to yourself. Lots of people don’t like being followed or having their mail read. So what can we do?

Start off by changing your Web browser and install something more security conscious like Mozilla Firefox. To prevent cookies following your movements the way they did at SurvivalBlog, install the free add-on Do Not Track Plus which will alert you the instant any site has a bead on you.

If you want to keep your personal correspondence personal, there are numerous options, both Deep Web and Surface Web.

Emails are easily read as they travel between computers on the Internet, so one answer is not to transmit the message. Simply open a free email account and then give the address and log-in details to your friends. Messages are then written but saved as Drafts and never sent. The draft messages are then accessed by those with the password.

Or you can go all James Bond. At PrivNote you can compose lengthy messages and then generate a link which you send to a friend. When they read the message, it automatically self-destructs which means no one can read the note again, and the link dies.

To send emails that cannot be traced, consider an email re-mailer like or which strip off any identifying codes and add new ones along the journey. When the email arrives at its destination, there is no way that it can traced back to you.

Or imagine receiving an email with a photograph of your cousin on vacation with her fiancé. But, known only to the two of you, there is a secret message hidden inside the image.

You can hide almost any kind of digital file by embedding it inside another digital file. This art is called steganography and there are a number of programs that perform this magic, some free like QuickCrypto.

Top Secret documents can be embedded inside a photo, short videos can be transmitted secretly inside a music file, and messages can be passed on by a digital ‘drop box’ held on a photo within a website. Counter-technology is next to hopeless.

You can set up all these things in minutes but, if you want to go all the way to Red Alert, you will need to go Deep Web and that involves downloading and configuring the free Tor/Firefox bundle. But this Hidden Network on the Deep Web is not without its risks and needs to be fully understood before you venture down there.

For that you are going to need to read the book.

Deep Web Secrecy and Security, by Conrad Jaeger is published by and is available as an inter-active e-book on Click on its title in this paragraph to view the page where you can place your order.


Online Security–How Concerned Should Preppers Be?

Now and then I hear from readers who are concerned about online security. How concerned should preppers be about being tracked online? They wonder whether it’s safe to make purchases from my site or other prepper sites. In fact, is it even safe to view such sites?

I’ve assured readers that, to the best of my knowledge, any tracking being done is by advertisers who are more interested in their buyng habits than the government is in gathering data. Of course, that may not always be the case.

The main thing is to practice common sense by not deliberately revealing too much about yourself online.

Back in the spring I interviewed Riverwalker for DestinySurvival Radio on the subject of OP SEC and how preppers can practice discretion to protect themselves and their families. I wrote a post asking the question, Are you protecting one of your most valuable assets?

The asset I was referring to is personal privacy. I’m a firm believer in exercising discretion online. For example, if you look up my personal Facebook page, you’ll learn very little about me personally. In fact, if it weren’t for using Facebook as a tool to drive traffic to this site, I wouldn’t have a Facebook page at all.

But is my aloofness online enough?

Not according to Conrad Jaeger. He’s written an e-book called Deep Web Secrecy and Security. I’ve chosen it as a DestinySurvival Pick because he makes an important contribution to privacy issues for preppers.

The other day I received a press release about Deep Web Secrecy and Security, and I want to share its most important content with you. Draw your own conclusions and see if this e-book is for you.


* * * * * *

You probably wouldn’t submit to having your home searched without a court order, so why allow the authorities to read your emails and monitor everything you do on-line?

If you are buying survival supplies on the Internet and looking up firearms then you are almost certainly on a watch list. These days everybody is a suspect and all our on-line activities are being logged somewhere.

And if things are bad now, just wait until the Utah Data Center comes on-stream in 2013 when absolutely everything you say or do on the Internet will be logged and analyzed and used to profile you the way they do in the movie Minority Report.

From totalitarian regimes to outwardly democratic governments, there is a growing demand for access to people’s personal data. They want to read your emails and they want to know who your friends are.

Personal information is a commodity today. It’s bought and sold and analyzed, and then it’s used to profile you for advertisers, campaign organizers, governments and criminals, stalkers and trolls. But none of this need happen.

Curiously, one might wonder why governments and the like are going to all the trouble of tracking us and storing our data, especially when they are ostensibly trying to catch pedophiles and terrorists.

As it happens, the really bad guys are not using the Surface Web to communicate. They are already very Deep and well ahead of the game. A cynic might wonder if there were ulterior motives in wanting to keep such tight tabs on us all.

But you don’t have to be up to no good to want to keep your on-line activities to yourself. Why can’t ordinary people be anonymous, too?

‘Deep Web Secrecy and Security’ uses the secrets of the Deep Web to protect you and your family, your private and business interests, your views and your freedoms.

“The Internet was never conceived to be the preserve of commercial interests. It should not be a hunting ground for law enforcement. The time has come to take back control,” says the book’s author Conrad Jaeger.

This Inter-active e-book with direct links to Surface and Deep Web will show you in simple terms how to:

  • Travel the Deep Web
  • Protect Yourself On-line
  • Set up Secure Communications
  • Avoid Unwanted Attention
  • Blog and Post Anonymously
  • Access Banned Websites
  • Erase & Protect your Activities
  • Upload and Download Secretly
  • Hide and Encrypt Anything

* * * * * *


You should be aware that, in my opinion, Deep Web Secrecy and Security gets technical and recommends fixes which may be beyond the skill level of many of us. On the other hand, you may be all right if you apply adequate time and thought to following directions. Or you may want to recruit help to implement several of the recommendations.

But this e-book also contains simple suggestions nearly everyone should be able to perform. For example, it’s a must to install and regularly use good antivirus and anti-spyware software.

Deep Web Secrecy and Security
is available from Amazon for Kindle. You can get your copy by clicking on its title wherever you see it linked in this post. You’ll be taken to the page where it’s featured. Add it to your cart to start the order process. If you don’t have a Kindle, you can order a PDF version of the book through

Online security is an issue that needs clarification and perspective. What do you think? How concerned are you about your privacy online? What steps are you taking to insure Internet security? Leave a comment and let’s discuss it.