"The more they know about you, the more effectively they can manipulate and control you."
How To Guard Your Privacy
1) Identify what critical information you need to protect. What is critical information? Examples of critical information may include financial information, social security numbers, passwords and PINs, medical information, political and religious affiliations, memberships in certain organizations (NRA, GOA, prepper groups, etc.), medical conditions, "jab" status, gun ownership, presence of valuable items in the home (guns, gold, silver, cash, etc.), and purchases of large amounts of food and other supplies. It also may include certain plans (home security measures, personal security measures, when and where we plan to "bug out," etc.). Even letting others know of your vacation plans may let bad guys find out when you are not going to be home.
2) Next, make sure that everyone in your family/group understands what information to protect. Share this critical information on a "need to know basis" only. Even within your family/group, not everyone needs to know everything. This doesn't mean that you don't trust your family or group members. Rather, the less people that know something, the less chance of it accidentally being revealed.
3) If you have children in your family, you need to talk to them about not sharing certain information with non-family members. Teach them to respond to questions about the family's finances, religion, politics, firearms in the home, parents' jab status or opinions on vaccines, by responding "I don't know," and "You'll have to ask Mommy or Daddy about that."
This includes not answering these questions from teachers and other authority figures. "I don't know," and "You'll have to ask Mommy or Daddy" are perfectly valid answers for a child to give their teacher. Young children will need to be reminded of this often. Also, be careful about what information you share with and around your children, as they do have ears, and they do repeat things.
4) Public, and even private, conversations, can be overheard. Be aware of your surroundings and topics of conversations. Even off-hand remarks can reveal critical information. Make sure your conversations are really private before discussing critical information. Having a private conversation in a restaurant? Chances are your waitress and any nearby diners will hear at least parts of it. Having a private conversation in your backyard? The neighbor who just happens to be on the other side of that privacy fence probably can hear every word.
5) Be aware how certain information may reveal other information. For example, that "First Baptist Church" bumper sticker reveals not only your church membership, but also tells the bad guys you're probably not at home on Sunday mornings. Think through what the bad guys may able able to deduce from seemingly innocent information you do give out.
6) Shred or burn (instead of throwing away) all unneeded paper that may reveal critical information, including bills, shopping receipts, insurance papers, bank statements, tax records, pay stubs, ATM receipts & other financial documents, pre-approved credit card & loan applications, prescription labels, expired passports & driver's licenses, among many others. This may also include any notes or lists you've made regarding your prepper or bug-out plans
7) Be careful of what trash & recyclables you leave at the curb. Even empty boxes may reveal to those nosy neighbors what, and how much, you are buying. Options to roadside recycling include taking the boxes to the recycling center yourself, or even burning them or using them in composting or sheet mulching. Remember to shred/burn critical papers.
8) Be cautious in your use of social media, email, text messaging, and the Internet. Realize that if you are emitting electronically, your use is being monitored, logged and stored. NEVER use electronics to commit illegal acts, make threats, or to stalk or harass others (you shouldn't be doing these things anyway). When surfing the Internet, avoid the "Red Light Districts" (adult sites, illicit drug sites, or other sites used for illegal/unethical activities), as visiting those sites greatly increases your chances for computer viruses, phishing attacks, ransomware, and attracting the attention of both the bad guys and law enforcement.
9) Don't overshare on social media. Never share critical information on social media. Be aware of what information you might be unintentionally sharing. For example, that selfie you posted with your car's license plate clearly readable in the background.
10) Use cash whenever possible. Cash (and barter) is the least traceable means of economic exchange, and the least likely to leave an electronic or paper trail leading back to you.
11) Be mindful of how you use of affinity cards, as well as credit, debit, or checking cards, and even modern library cards, as they all collect and log data about you and your habits. This information may then be used by the company, shared with its vendors, sold to other companies, or stolen by company employees or outside hackers. It could also be obtained by the government (even without a warrant in many cases).
______________________
AD: Total Resistance - The classic study on resistance & underground operations, by Swiss Major H. von Dach. Recommended by Pastor Joe Fox (aka Viking Preparedness).
AD: Resistance Operating Concept (ROC) - Another great resource for resistance & underground operations. Recommended by both Pastor Joe Fox (aka Viking Preparedness) and Bear of Bear Independent.