Jump to ratings and reviews
Rate this book

ComSec: Off-The-Grid Communications Strategies for Privacy Enthusiasts, Journalists, Politicians, Crooks, and the Average Joe

Rate this book
The most prolific, comprehensive, and intrusive mass surveillance device ever designed by man is the cellular phone you carry with you everywhere you go. This device tracks and collects a staggering amount of personal information. That valuable data is sold and stored indefinitely by a an equally staggering number of companies, government entities, and data brokers that you never knew even existed. How is this data being used, and how will it be used in the future? Communicating with loved ones, colleagues, and other people is a fundamental human necessity. In today’s digital world, the ways in which we communicate are convenient, instant, and often happen without even thinking about the technology that makes it all possible. The privacy of our communications, our movements, and our thoughts are also a cornerstone of a free and open society. COMSEC uncovers the methods used by businesses, data brokers, and governments to harvest our data using the surveillance device that we allow into our lives in order to stay constantly connected. The authors share detailed first-hand knowledge about the tools, tradecraft, and techniques used to mitigate and eliminate the threats posed by tracking our communications. These same tactics, taught to covert law enforcement officers, military operatives, and the clandestine community, are explained here for anyone to adopt for their own personal communication strategy. COMSEC is a must read if private and secure communications is important to you. Choose the tactics appropriate for your threat model, or choose to take more extreme measures. If you are a government employee, service member deployed behind enemy lines, a journalist, activist, dissident, politician, shady character of any type, or a privacy advocate, COMSEC offers the tried and tested solutions that you need to know.

122 pages, Kindle Edition

Published July 15, 2018

About the author

Justin Carroll

7 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
5 (29%)
4 stars
3 (17%)
3 stars
5 (29%)
2 stars
4 (23%)
1 star
0 (0%)
Displaying 1 - 2 of 2 reviews
Profile Image for Anne Fox.
Author 25 books48 followers
October 29, 2020
This is a short book detailing methods of creating and maintaining security when using cellphones and other communication devices. Copyrighted in 2018, it's likely already outdated. However, my main problems with the book revolve around some poor editing and proofreading, with (for me) a high number of typos and misused words ("will" for "with," for instance) and references to links which are not given—thus making all of the discussion focused on that link worthless (see p. 29, 31, 35, and 37, dear authors).

With some updating, a little expansion of resources (not just the authors' favorites), and a more careful look during editing and proofreading, I'd have given this book a higher rating.
Profile Image for Paul.
22 reviews
October 16, 2019
Nothing new here. More of the same found in previous books.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.