[do_widget id=nav_menu-4]

Free Articles

,

Why thieves are targeting your trash

A group of criminals in St. Tammany Parish, LA were arrested after they went dumpster diving. This criminal ring was targeting trash from a local loan business – one of those “cash now” places. The group rummaged through the trash to gather personal information about customers. They used this information to either steal existing credit …

,

Is your home title already stolen?

Norris Fisher sold $4 million worth of property during his career… But, none of the sales he made were legal. He stole people’s property out from underneath them using forged documents and fake credentials. Here’s an example of the type of crimes Norris and his criminal friends commit: One day, John S. of Fort Worth, …

,

National gun registry?

Federal background checks are required to buy guns from a licensed dealer. But what happens to the paperwork you fill out to buy a gun? What happens with your ATF Form 4473?: Form 4473 is the form that you fill out to buy a gun from a licensed dealer. It’s a few pages long and …

,

Guns you need to be familiar with

For over five years, a man known as the AK-47 Bandit robbed at least seven banks. The FBI gave the man the name because he wore a dark balaclava ski mask, body armor, and black gloves, and carried an AK-47 rifle with a drum magazine during his robberies. During one of his robberies, he shot …

,

Copy these “Insurgent” tactics to survive

During Operation Snipe, personnel from the British 45th Commando Group cleared a remote area of the Afghan mountains. Over 1,000 British personnel were part of the operation. Their goal was to search, clear and, destroy Taliban hideouts in the mountains. During the operation, they discovered a massive cave network and a huge arms cache. The …

,

Website or hacker trap? Here’s how to tell

According to defectors, North Korea’s cyber army has about 7,000 hackers. Their job is to wreak havoc on the country’s enemies. Recently, North Korean hackers targeted cybersecurity researchers in the U.S. North Korean hackers set up a fake cybersecurity company called SecuriElite. They also created fake social media accounts on Twitter and LinkedIn. Their goal …