Tonight, former Trump Advisor Sebastian Gorka and Oklahoma U.S. Senate Candidate Jackson Lahmeyer will headline a rally in Tulsa, Oklahoma to remove RINOs from government.
This event will feature many key guest speakers including Arizona State Senator Wendy Rogers, Jack Posobiec, DC Draino, Ryan Fournier,
and many more.
Jackson Lahmeyer is an Oklahoma pastor who refused to bow down to the radical left and close his church during the COVID-19 lockdowns.
Lahmeyer toured the Arizona audit coliseum in June and he supports a full forensic audit in every state.
He knows that Oklahoma’s electoral votes for Trump were stolen and invalidated.
Sticky notes provide a quick and easy way to write down snippets of important information — phone numbers, addresses, appointments, website URLs, and so on. But these colorful scraps of paper are low-tech tools in a high-tech world. With an NFC Tag Reader, storing vital information discreteley goes digital.
If you could design a modernized Version 2.0 of a sticky note, what characteristics would it have? It might be more durable, and water-resistant so it won’t become illegible if it gets wet. Maybe it’d be smaller, but with the capacity to store more text. Most importantly, the data it contains — letters and numbers are a form of data, after all — should be easy to access at a moment’s notice. These “advanced sticky notes” might incorporate some technology, but they shouldn’t rely on access to the internet or the power grid. And for the security-conscious user, these notes should be concealable in discreet locations and should offer optional password-protection to deter prying eyes.
Above: NFC tags are available in many forms, including paper-thin, flexible, weatherproof stickers. They can remain readable for more than a decade.
Near Field Communication or NFC tags serve as a compact, concealable, and versatile means of storing small amounts of data. Think of them as digital sticky notes — they can be bought by the dozen for a few bucks, programmed instantly with a smartphone app, and placed almost anywhere.
What is NFC?
Near Field Communication is a radio communication standard similar to Wi-Fi, Bluetooth, or RFID, but as its name indicates, it’s intended for extremely short range. NFC devices transmit on the 13.56 MHz frequency over a maximum distance of about 4 inches. NFC’s most common use is for contactless payment systems, which allow a chip in your credit card or smartphone to wirelessly transmit payment information to a nearby point-of-sale terminal. NFC tech can be used for countless other purposes, which we’ll discuss more below.
What is an NFC Tag?
An NFC tag is a tiny wireless device that contains a small amount of memory, a radio chip, and an antenna. NFC tags don’t contain a battery; they draw the minuscule amount of power they need from the reader (e.g., your smartphone) via magnetic induction. They’re typically about the diameter of a quarter and can be fully encased in waterproof polymer or attached to a paper-thin, flexible sticker. Many colors and designs are available, and users can write on plain tags with a permanent marker. Most modern NFC tags are rewriteable, so they can be used over and over for decades. It’s also possible to lock tags in “read only” mode so they can no longer be edited. Some NFC tags support optional passwords and/or encryption to enhance security.
Above: We purchased a pack of 20 NFC tag stickers online for $15 shipped.
Buy from a reputable seller to ensure you’re getting current-generation, reliable tags.
There are myriad NFC tag variants, each with different storage capacities, transfer speeds, features, and price points. For the purposes of this article, we bought a small pack of 20 NFC tag stickers from Amazon for $15 including overnight shipping. They’re based on the NTAG216 chip and offer 888 bytes of usable memory. This chip is rated for 10 years of data retention and 100,000 read/write cycles.
How Do I Read and Write Tags?
Thanks to the prevalence of contactless payment systems like Google Pay and Apple Pay, most modern smartphones contain NFC hardware. To check if your phone is NFC-compatible, refer to the running list on Wikipedia.
If your phone supports NFC, you’ll just need to confirm that the appropriate setting is enabled and download an NFC reader app. For this article, we used an iPhone 11 and installed a free app called NFC Tools. The app makes it simple to read, write, erase, password-protect, and lock tags.
In addition to manually programming tags with text or other data, you can use automation apps to link your NFC tags to specific actions — set an alarm, send a text message, navigate to a destination, etc. On iPhones this is included in the built-in Shortcuts app; for Android phones, you can download a third-party automation app such as Tasker. See this sidebar for more details on NFC tag automation:
Automating Tasks with NFC Tags
As we mentioned earlier, NFC tags can be used in conjunction with automation apps to trigger complex sequences of actions. For example, let’s say an emergency has occurred and you need to send text messages to each member of your family, start the navigation app on your phone to check traffic conditions, dim the screen to conserve battery, and turn on do-not-disturb mode for any incoming calls outside your inner circle. These tasks could be completed by swiping your phone over a “SHTF” tag that does it all instantly.
If you’ve already integrated “smart home” features into your house, you could tie these into your NFC tag automation sequence. Remotely turn on the lights, crank up the volume on the TV, and activate your security system to convince potential intruders to pick a different house. Lock your computer or go full scorched-earth and wipe the hard drives. Activate a string of Wi-Fi-enabled Christmas lights that could hypothetically be wired into various booby traps (for legal reasons, that’s a joke). The sky’s the limit.
On a more practical note, NFC tags are great for saving time on simple daily tasks. Slap one on your washing machine to start a timer that alerts you when clothes are done. Put one in the phone cradle in your car that pairs the Bluetooth and starts a music playlist. Place one in a medication bottle that tracks each time you take a pill and activates a reminder if you forget to do so.
The catch is that the instructions for these automation sequences are stored on your phone, not on the tag. That means it won’t work with someone else’s device unless you apply the same settings in advance.
Uses for NFC Tags
Now that we’ve got the technical details out of the way, we can move on to the fun stuff.
As we mentioned above, NFC tags have only a small amount of memory. Our NTAG216 chip can store 852 characters of plain text. It’s possible to find non-standard NFC tags that can store several times that amount, but these will be much more costly and potentially unreliable with certain readers. Thankfully, there’s still a lot we can do with this limited space. Read on for a few noteworthy examples.
Above: We chose discreet black stickers, but tags can be found in a variety of colors and designs.
You can even mark tags with a Sharpie to denote their functions.
Store Emergency Information Here’s a straightforward one that harkens back to our sticky note analogy. A tag can be programmed with emergency contact phone numbers, addresses, or coordinates for a bug-out location. In the event that you lose your wallet, you might store your driver’s license number and insurance info on a tag in your vehicle. If you need to stash some money discreetly, you could put funds on a prepaid debit card, save the info on your NFC tag, and shred the physical card. The same technique could be used for an emergency prepaid phone card. Of course, take precautions to ensure this information doesn’t fall into the wrong hands — conceal the tag, add a password, or both.
Show Proof of Ownership If you’re looking to prove you own a piece of valuable property, you could attach a label with your name and address, but that’s easy to remove and poses some privacy concerns if it falls into the wrong hands. A hidden NFC tag containing the same information will be just as effective but much harder for thieves to notice.
Link to a File or Website Although NFC tags don’t have much local storage capacity, they can certainly provide a link to data that’s hosted elsewhere. This can be used to save someone the trouble of typing in a website URL, or it can provide a private link to download files. Those files could be encrypted, turning the NFC tag into a digital key that unlocks a huge archive of sensitive documents cached online.
Store a Password When you go on vacation, you might hide a key in a secure spot in case a trusted friend or neighbor needs to enter the house in an emergency. NFC tags can be used in a similar fashion to store passwords in an innocuous place. This way, you can tell the house-sitter to hold their phone up to a specific picture frame in the hall to instantly retrieve a gun safe code or security system override code.
In less dire circumstances, it’s a good way to share your Wi-Fi password with visitors without repeatedly explaining the spelling and capitalization.
Dead Drops In Issue 37, Tom Marshall explained the Cold War spycraft technique known as a dead drop. This involves two parties covertly exchanging information without making direct contact. For example, one agent would leave a note in a hidden location and give a predetermined sign that a drop was ready — a chalk mark on a mailbox or a piece of tape in the corner of a window. A second agent would see the sign and retrieve the drop.
Large amounts of digital information might require a USB drive loaded with files, but this can be risky, since anyone who sees it will know it contains data. On the other hand, most people would never guess that an NFC tag contains data, much less consider how to retrieve it. It’d be easy to write a few sentences onto a tag and stick it inside a book jacket, onto the underside of a bench, behind a car’s fuel door, or in thousands of other creative locations. The recipient would only need to scan the tag from a few inches away and could rewrite a response without leaving so much as a fingerprint.
For added security, apply a password, encrypt the tag, or encode the message itself with a cipher.
Above: We used this free NFC Tools app on an iPhone to read, write, and modify our tags. It also showed us the tag’s type, capacity, and features.
Nearly Infinite Possibilities
Much like the ubiquitous sticky note, NFC tags are nothing more than repositories for small amounts of information. You can write anything you wish onto them, from a simple phone number to an encryption key that unlocks every one of your digital assets. Despite their relatively small capacity and short range, they’re incredibly versatile, especially when they’re paired with automation apps that can control your smartphone or home appliances. Pick up a few and start experimenting — you’ll be surprised by all you can accomplish with a single swipe.
Steganography: More than Meets the EyeThe digital spaces that society has become virtually dependent upon over the last 10 to 15 years are increasingly becoming nonpermissive. Big Tech censorship, intelligence organizations, […]
Keeping Your Finances Afloat Above CovidAmericans face challenging financial times as the coronavirus pandemic continues to wreak havoc on the economy. The definition of how society and the economy works is changing as companies […]
Vintage Electric Bikes Scrambler S: A Survival Ebike ReviewWhile I was writing this article, strong Santa Ana winds had caused catastrophic fires in several regions of California. In the name of public safety, Pacific Gas and Electric (PG&E) — […]
Battle Belt Setup: Weight Off Our ShouldersNicholas Nassim Taleb in his book Antifragile commented that some of the greatest inventions are creations so simple and ubiquitous, that they nearly go unnoticed, such as the spoon or […]
Covert Escape Tools: Pocket PrepsHuman traffickers, process predators, narco-terrorists, hostage-takers — these are just a few groups within the criminal element that employ unlawful custody. These types of criminals are […]
Binoculars Buyer’s Guide: A Closer Look at 10×42 BinocularsTake a look at the animal kingdom and pay careful attention to the physiology of successful predators. You’ll notice a few common threads, such as sharp claws and teeth, quick reflexes, […]
Tactical Shorts Buyer’s Guide – Summer 2021These tactical shorts are discreet enough for every-day carry, but durable and flexible enough for weekend hikes and range trips.
NODs and Night Vision Tubes: Evaluating what CountsThroughout human history, our species has always looked for advantages in both technology and tactics. The rock became the club, which became the spear, which became the arrow, and finally […]
Covert Carry versus Concealed CarryWhat do you think of when you hear the term “concealed carry?” Your first thought might be the legal definition of carrying a concealed gun or knife, and the accompanying guidelines in […]
Since Monday September 27, Samy M. has been on trial at the Drôme Regional Court in Valence for the crimes committed in December 2018. He abducted and raped his then 24-year-old sister, who had left the family home in Bourg-de-Péage a month earlier. When he found out that she was having an intimate relationship with a woman, he then attacked her. He lured her to the river Drôme, where she had gone with two girlfriends. Armed and hooded, he forced them to go to a deserted place, beat them, forced them to kneel down; then the thirty-year-old deeply carved both cheeks of his sister’s girlfriend with a razor and said, as the victims told us at their hearings: “I will make you smile forever.
The court accused him of having carried out this abuse “because of the sexual orientation” of the young women. The three victims affirmed this: According to them, the man from Bourg-de-Péage claimed that “a woman has to date a man and that this [homosexuality, editor’s note] is not done among Muslims. A tendency towards homophobia that was shown in prison, but which Samy M. has since denied.The reaction of the three victims, sitting in the front row and facing the horror of what they have experienced, shows that they were not dealing with a friendly, concerned older brother. The three young women are pale, one is trembling, the second has breathing problems. The third, who is in the middle of a panic attack, has to be treated by the fire brigade. Despite the mask, you can see the scars on her cheeks that will disfigure her for life.
Special Counsel John Durham has issued a new set of subpoenas, including to a law firm with close ties to Hillary Clinton’s 2016 campaign, an indication that Durham could be trying to build a broader criminal case, according to people briefed on the matter. So far, Durham’s two-year probe into the FBI’s Russia investigation hasn’t brought about the cases Republicans has hoped it would.
The grand jury subpoenas for documents came earlier this month after Durham charged Clinton campaign lawyer Michael Sussmann with lying to the FBI in a September 2016 meeting. During that meeting, Sussmann handed over data purporting to show links between the Trump Organization and Russia’s Alfa Bank. That tip became part of the FBI’s investigation into Russian interference in the 2016 election but the FBI ultimately couldn’t find evidence of a link.
In seeking additional documents from Sussmann’s former law firm, Perkins Coie, investigators from the special counsel’s office appear to be sharpening their focus on the Democratic political machinery during the 2016 campaign and efforts to tie Trump to Russia.
Perkins Coie’s clients in 2016 included the Clinton campaign and the Democratic National Committee.
Government funding is set to expire at 11:59:59 pm et Thursday.
15 Republicans voted with Democrats to avert a shutdown.
The stopgap bill funds the government until December 3 and does not raise the debt ceiling.
The bill includes $29 billion in disaster relief for states hit hard by Hurricane Ida and provides $6 billion to resettle Afghan ‘refugees.’
“This is a good outcome, one I´m happy we are getting done,” Senate Majority Leader Chuck Schumer said. “With so many things to take care of in Washington, the last thing the American people need is for the government to grind to a halt.”
The senate-passed bill will head to the House for a vote this afternoon and requires a signature from Biden.
If you’re a first responder, military, or law enforcement officer, you’ll no doubt be familiar with the litany of discounts and options there are available to you through reputable firearms manufacturers. Smith & Wesson’s popular American Guardians Program has recently been updated to now include all honorably discharged veterans. This is actually a pretty big […]
Just like the flu and the common cold, COVID-19 has magically eradicated its own “Mu variant” now. But don’t worry, you’re still supposed to be in a panicked state of distress over the Delta scariant, and line up for the shot.
So the “variant” of which we have exactly zero evidence even exists, considering there’s no evidence the original COVID-19 virus exists, has been eradicated. It’s amazing how everything can be eliminated except the things they need you panicking over.
We know they aren’t specifically testing for individual variants, especially considering the PCR tests used are only picking up the common cold and the flu anyway. So why use Mu as a “vaccine-resistant” variant? It’s hard to say unless they desperately need people to believe there are variants out there for what’s coming next.
Of course, there’s a chance the variant could return to the U.S. if someone from outside the U.S. with the variant infects an American. But for now, the mu variant threat seems to have been quelled. –Desert News
It appears that they want to keep the focus on the Delta variant for now, likely because they already convinced the public that the “vaccines” can handle Delta. In fact, Maria Van Kerkhove, the WHO’s technical lead on COVID-19, said in a video Q&A in early September that the delta variant was “outcompeting and replacing” all other coronavirus variants.“Of those four variants of concern, delta is, by far, the most transmissible,” Van Kerkhove said. “If delta is identified or starts to circulate in a country where there is beta … (delta) has quickly replaced the variant there.”
But they aren’t testing specifically for Delta, so how do they know how many cases there are? They are guessing after you get a positive COVID test. Is anyone else getting tired of this massive scamdemic hoax yet? It is never-ending.
Keep asking questions. Keep your alert levels up. Keep honing those critical thinking skills.
Only Trump supporters get investigated by the regime.
General Mark Milley and Defense Secretary Lloyd Austin surrendered Afghanistan to the Taliban, armed the terrorist group with over $80 billion in US military weapons, left thousands of Americans and green card holders stranded in the country — and they still have their jobs!
Lance Corporal Hunter Clark attended the Trump rally last Saturday in Perry, Georgia.
Lance Corporal Hunter Clark was invited on the stage by President Trump. He was not in uniform. Clark told the crowd, “I am the guy who pulled the baby over the wall and it’s definitely probably one of the greatest things I’ve ever done in my entire life.”
What a hero!
2 thank you’s:
1. Thank you Lance Corporal Hunter Clark for rescuing the infant at Kabul Airport given up by its mother in her selfless act.
2. Thank you President Trump for honoring a war hero like Hunter Clark before the world tonight.#TrumpRally#TrumpRallyGeorgia
On Saturday we wrote this at The Gateway Pundit, “Defense Secretary Lloyd Austin and General Milley will probably denounce this hero by morning.”
We were right.
Lance Corporal Hunter Clark is now being harrassed and investigated by the US military under the direction of Lloyd Austin.
You can surrender a war to 7th Century barbarians and leave them with $80 billion in US weapons. That’s OK. But you are not allowed to walk on stage at a Trump rally after you rescued babies in Kabul. That’s not OK.
What an outrage!
Newsmax reported:
Hunter Clark, who was seen saving an infant by lifting it over the walls outside the Kabul airport in Afghanistan during the U.S withdrawal, is now being investigated for appearing with former President Donald Trump at a recent rally, the Task & Purpose military news outlet is reporting.
Clark, a lance corporal, was part of the troops guarding the airport last month. He was seen in video standing on a wall as a man desperately handed him the baby.
He appeared on stage with Trump at a “Save America Rally” on Saturday in Perry, Georgia. Now, his command is investigating whether the appearance violated the military ban on active-duty troops getting involved in partisan political activity, the outlet said.
“The 24th Marine Expeditionary Unit (MEU) has initiated a command investigation regarding LCpl Hunter Clark’s attendance at the event last weekend to determine if any DoD policies were violated,” said Capt. Kelton Cochran, a spokesman for the 24th MEU. “Any details pertaining to this incident are not releasable while the investigation is being conducted.”
Cochran did not detail which policies he was referring to.
Why has no one reported this? Hunter Biden worked with a presumed mobster, who’s friends were mobsters, to line up a meeting with a group of Chinese leaders and Joe Biden in the White House.
Yesterday we reported a crazy story about a guy from Illinois and the St. Louis area who was involved with lining up a meeting between some Chinese leaders and Joe Biden in the White House. The Illinois guy was Gary Fears who had business associates who were believed to be members of the mob.
In November 2011, Gary Fears had dealings with Tucson businessman Gary Triano. The middle aged Triano was killed when his car blew up with him in it.
Although it was later claimed that Triano’s death was not connected to the mob, it was first suspected that the mob and specifically Gary Fears had ordered a hit on Triano due to the debt he owed Fears.
…Sheriff Clarence Dupnik himself told the media five days after the bombing Triano’s death “has all the markings of a mob hit.”…
…Several of Triano’s business associates had a motive to kill him, Herberg said, including Gary Fears, who was suspected of ordering two other murders. Herberg described Fears as the head of a non-La Cosa Nostra organized crime group and said Triano was preparing to sue Fears for $10 million over a failed business venture.
“Gary Triano was investigated for money laundering, skimming, and filed bankruptcy to discharge millions in lawful debt. Under the circumstances of numerous organized crime connections, it is reasonable to infer that Gary Triano had debts beyond the lawful debts discharged in bankruptcy in June 1996. Gary Triano was also threatening the interests of organized crime people,” Herberg wrote.
This same Gary Fears, who was not assigned to any relationship to Triano’s murder, is the same guy that Hunter used to connect Chinese leaders to VP Joe Biden in the White House.
On Wednesday a fully vaxxed Marc Lamont Hill revealed he suffered a heart attack and had deep vein thrombosis which caused a pulmonary embolism.
“I am home and recovering after a rough week. After my successful Achilles surgery on Friday, I was rushed to the ER on Saturday after suffering a mild heart attack. Turns out that I had DVT (deep vein thrombosis), which caused a pulmonary embolism. Blood clots nearly completely blocked my lungs, preventing blood flow to my heart. The doctors told me that I was VERY lucky not to have died. Fortunately, I received EXCELLENT medical care from the team at Temple University Hospital. The doctors accurately assessed my condition and removed the clots. My body is worn out and sore but I couldn’t feel more grateful to be alive and on the path to full recovery. Please listen to your bodies. If something feels off, GO TO THE DOCTOR. Don’t worry about seeming like a pain or a hypochondriac. JUST GO. Thanks to everyone who helped, or offered to help, during this terrifying time. I’m blessed with amazing friends, wonderful family, and plenty of unmerited grace and mercy.” Hill said on his Instagram account.
Marc Lamont Hill on Thursday said the notion that he developed blood clots from the Covid vaccine is “ridiculous and completely baseless.”
I’m seeing videos and tweets from anti-vaxers saying that I developed blood clots from the vaccine. This is ridiculous and completely baseless. For some, it is a cynical and dishonest claim. For others, it’s a lack of understanding of how medicine and science work.
Mr. Hill said he developed deep vein thrombosis and blood clots from his Achilles rupture. “This is an extremely common outcome for such injuries,” he said.
After my successful Achilles surgery on Friday, I was rushed to the ER on Saturday after suffering a mild heart attack. Over the previous two weeks, I had DVT (deep vein thrombosis), which was caused by my Achilles rupture. This is an extremely common outcome for such injuries.