Ask a Prepper
ask a prepper survival every day
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • Home
  • Editor’s Pick
  • Prepping
  • Survival
  • How To’s
  • Food
  • Prepper Guides
  • Store
  • Staff
  • About Claude Davis
  • Home
  • Editor’s Pick
  • Prepping
  • Survival
  • How To’s
  • Food
  • Prepper Guides
  • Store
  • Staff
  • About Claude Davis
No Result
View All Result
Ask a Prepper
No Result
View All Result
Home Prepping
How to Hide Your Phone From 3-Letter Agencies

How to Hide Your Phone From 3-Letter Agencies

Eric Beuning by Eric Beuning
October 9, 2025
19
Print Friendly, PDF & Email

In a world where the government’s eyes and ears reach farther than most people realize, your smartphone can become a serious information liability. When used for the wrong purposes, your phone can be one of the easiest ways to be tracked, profiled, AND monitored. Agencies with three-letter names, like the FBI, CIA, NSA, and DHS, have both the legal tools and the technological muscle to do more than just pull location data. If they deem it necessary, they can potentially read your communications, texts, and emails. With certain phones, they might even be able to turn on your microphone or camera without your consent. In theory, they need a warrant for that but can you really trust them?

Even if you’re not a prepper, that invasion of privacy is unacceptable. It can become even more concerning if an innocent text message or joke gets interpreted the wrong way, like we often see with tweets in the UK, and you end up on a watch list. Or worse, you get arrested. This article will walk you through the mindset, the methods, and the practical steps to keep your phone and the data it carries out of the wrong hands.

Big Brother Is Watching YouUnderstanding the Digital Information Landscape

Hiding your phone from three-letter agencies is about more than just dodging “Big Brother.” It’s about protecting your operational security (OPSEC), your location, and your network of contacts in a crisis. There are many ways for unwanted eyes to access information on your phone.

Cell Tower Triangulation

Even with GPS turned off, your phone constantly connects to nearby cellular towers. This allows agencies to pinpoint your location within a few miles or even a few meters.

IMEI & IMSI Tracking

Every smartphone has a unique hardware identifier (IMEI) and SIM card identifier (IMSI). These can be logged every time you connect to a tower. Further leaving a digital footprint of where you are, as well as tracking a pattern of your movements.

App Data Sharing

Sneaky ways to outsmart intelligence agenciesThese days a lot of popular apps send your location and behavior data to commercial brokers and marketing firms. Every time you sign up for one, there’s usually some fine-print terms of use and privacy statement that allows them to use your data in certain ways.

Some of those fine-print statements allow them to sell your data to other companies and government agencies. Some three-letter agencies even have provisions that allow them to access private data if they consider it necessary.

Over-the-Air Exploits

Some agencies can push spyware to your phone through cell networks without you ever clicking a link. Not to mention all the games, downloads, and verification apps out there from third parties that certain three-letter agencies can exploit for access to your smartphone’s camera or microphone.

Consider Getting: JMDHKK K18+ Hidden Camera Detector, Spy Camera Finder, Bug Detector, Magnetic Field Detector, Listening Device Detector

Metadata Surveillance

Even if your messages are encrypted to hide the metadata of who you contacted, when, and how often, three-letter government agencies often have the means to decrypt them. In some instances, these data sets can be extremely valuable for building a profile.

NOTE: These vulnerabilities aren’t just limited to three-letter government agencies. Corporations and marketing agencies can use the same tactics in an effort to sell you things. Yet still grants them unwanted access to your smartphone’s information.

Surveillance isn’t just about your phone. It’s about power and control. And history shows, when control slips, the economy collapses fast. The last Depression blindsided millions—and it can happen again. Dollar Apocalypse is your survival guide to that moment: how to spot the early warning signs, what items become money when cash is worthless, and how to outsmart FEMA’s grip when the dollar dies.

GET Dollar Apocalypse here
(Special 76% Discount Available For Ask A Prepper Readers)

hiding your phoneHow to Hide Your Phone from Unwanted Eyes

The easiest way to hide your phone from three agencies is to not have one or bury it deep in the wilderness. Yet this isn’t really practical in today’s world. Instead, it’s better to use a multi-layer strategy to reduce your data footprint on the digital surveillance landscape.

Break the Psychological Attachment

Many preppers keep their phone with them 24/7, as it provides a sense of security and entertainment. That’s exactly what surveillance agencies count on. The more you carry your phone, the more you carry a tracker.

Take the time to assess all the situations in your life and whether you absolutely need to have your phone in your pocket to run to the store or pick your kids up from school. Try to create a “burner” mindset. Think of your phone as a disposable tool, not a digital appendage. Limit emotional dependency. If you’re checking your phone every few minutes, you’ve already lost the stealth advantage.

Don’t think of your phone as an entertainment device, as many of the games on it are designed to have a psychologically addicting quality. Instead of having your phone on at all times at home, it is better to just have all the information you need on one device that cannot be tracked. For instance, the Prepper Disk can be attached to any off-grid PC and give you access to 512 GB of survival content. This includes:

  • the WHOLE Wikipedia, maps of North America, Europe, and Oceania,
  • over 90,000 guides,
  • 60,000 ebooks from Project Gutenberg,
  • and all the prepper/survival books you ever bought in a digital format if you want to.

More about this fantastic resource here.

Control When the Phone Sees You

If your phone is on and near you, it’s giving away your position. The only surefire way to “hide” it from three-letter agencies is to prevent it from connecting to networks.

Just turning your phone off for a quick restart isn’t always enough, as some forms of malware can survive “off” states by simulating shutdowns. If possible, remove the battery, which is the most reliable way to kill tracking apps. If you can’t remove the battery from your phone, shut it off for an hour or more. You can then place it in a DIY Faraday cage, which will block all radio signals. You can also use the EMP Cloth, a highly efficient product capable of blocking all wireless signals.

This complete disconnect from the network for more than an hour is often sufficient for the tracking app to stop collecting data. Blocking signals is just step one though. If you really want freedom, you need to learn how to live without the grid breathing down your neck. No Grid Projects shows you exactly how to generate power, secure water, build food systems, and stay independent when the system shuts off. Every blueprint is practical, field-tested, and designed for preppers who refuse to beg for scraps.

> > Get No Grid Projects and start building your off-grid escape! < < 

Break Up Your Patterns

Your movements can be tracked via a wide range of apps. These are often related to retail stores and purchasing opportunities that have algorithms built into popular browsers. The location data sees that you’re near a store, and the algorithm is supposed to give you ads in your browser or other apps.

On the face of it, this sounds like it’s just a marketing technique. Yet all that pattern data is collected in apps and browser histories. If a three-letter agency wants to access it under the auspices of national security, they can. And there’s no way of knowing how they’ll interpret it. One way to reduce this tracking effect is to simply leave your phone at home when you go out shopping. Turned off. With battery removed. For real OPSEC, you may be better off traveling without it anyway.

Use Burner Phones and SIMs

When you do need a phone, consider using one that’s not directly tied to your identity. Purchase a burner phone with prepaid minutes using cash. Avoid buying from big-box stores that require activation with personal details.

Related: Do You Make These Fatal Mistakes In A Crisis?

You could also use prepaid SIM cards. Again, pay with cash and avoid linking them to your name. Then change devices often. Rotate both the phone and the SIM at random intervals to break data continuity. With this strategy, it’s important to never mix networks. Don’t log into your personal accounts from your burner device, which defeats the purpose. Also, remember that the moment you carry your burner in the same location as your regular phone, agencies can link them together.

Limit Digital Noise

FEMA Will Never Find You If You Use ThisEven if you hide your location, the way you use your phone can expose you. Try to minimize the number of apps you use, and/or have multiple apps for the same purpose. Don’t just use the same GPS app over and over again when you need to find various places. Switch GPS apps and use apps from competitor companies that are far less likely to share their data.

Try to avoid open-source software. Consider using privacy-focused Android builds like GrapheneOS or LineageOS. Then use Signal or Session for encrypted communication, but remember, encryption only hides the content, not the fact that you’re talking to someone.A good VPN can mask your IP address, but agencies with advanced resources can still correlate traffic patterns. So don’t think that logging into or out of your home and office VPN is foolproof.

Delete Unnecessary Apps

The more apps you have on your phone, the more ways your data can be tracked and transferred to three-letter agencies. If you’re not using an app for something important, delete it from your phone.

This is especially important for so-called “Verification Apps.” This new trend in smartphone apps is supposed to verify your identity by your face and/or your ID. Some platforms, like LinkedIn, are even requiring users to verify their identity via an app. If you do have to use one to earn a “Verification Badge,” make sure to delete it immediately afterward or verify using a burner phone.

Practice Real-World OPSEC

Hiding your phone is not just about tech, it’s about discipline. Never discuss sensitive plans over an unsecured phone. Assume it can be monitored.

Don’t trust convenience. Features like voice assistants, cloud backups, and “find my phone” are all potential surveillance gateways. Practice moving without your phone, using alternate communication methods, and staying situationally aware. And, one of the BEST things you could do is to never turn on your phone when at home. This is particularly true when referring to your secret bug out location. You have your bug out bag, worked hard to create a safe place for you and your family to retreat to when SHFT, secured it with anti-looter traps, and you ruin it by getting tracked to it with your phone.

Final Thoughts on Keeping Your Phone Data Safe

Three-letter agencies operate at a scale most citizens can’t imagine. That doesn’t mean you’re powerless. By combining old-school tradecraft with modern privacy tools, you can significantly reduce the chances of being tracked or your data being misused. Something as simple as having real books instead of digital versions can help.

Phones aren’t the only threat. Systems fail. Banks collapse. Grids go dark. If you want real security, you don’t just need tactics—you need the right playbooks. That’s why Dollar Apocalypse and No Grid Projects are the two survival manuals I keep closest. One protects you when money fails. The other keeps you alive when the power dies. At the core, hiding your phone is about breaking predictable habits, controlling when and how your device connects, and keeping your true identity separate from your communications. Like any survival skill, it takes practice and discipline to be effective.

You may also like:

How to build the invisible root cellarOutsmarting K9s: How to Hide Your Stockpile from Police Dogs

DIY Automatic Backyard Traps and Alarms for Looters and Intruders (Video)

Rights You’ll Lose Under Martial Law

How to Make Mace Spray: What They Don’t Want You to Know

Tags: CIAfbiopsecphonesmartphonestechnology
ShareTweetPin

Related Posts

Self-Defense Weapons That Are Illegal In Your State. Do You Have One Of Them?

Self-Defense Weapons That Are Illegal In Your State. Do You Have One Of Them?

May 3, 2021
I’m Afraid You’re Next

I’m Afraid You’re Next

July 6, 2023
Why Does FEMA Recommend Stockpiling These Items

Why Does FEMA Recommend Stockpiling These Items?

May 12, 2025
Pioneer Foods We’ll Be Eating A Lot After SHTF

Pioneer Foods We’ll Be Eating A Lot After SHTF

March 20, 2018
Finally, A Cheap Thermal Vision Device

Finally, A Cheap Thermal Vision Device

June 18, 2021
will an emp destroy electronics that are unplugged

Will an EMP Destroy Electronics That Are Unplugged?

November 10, 2025

Comments 19

  1. Outer Spice says:
    2 months ago

    I just pretend that the government is watching me all the time…it’s no big deal…I’ve been doing that for the last 50 years…if i think the F.B.I.is tuned in …i just call them Fat…Bald…and Ignorant….

    Did you like this comment? 6
    Reply
    • Ask A Prepper Staff says:
      2 months ago

      That is funny.

      Did you like this comment? 1
      Reply
  2. DUDE says:
    2 months ago

    I TURN OFF DATA AND LOCATION THEN ENABLE AIRPLANE MODE AND DO NOT DISTURB. MOST PHONES WONT LET YOU REMOVE THE BATTERY NOW AND THATS BY DESIGN. FIRST SO THEY CAN TRACK YOU. SECOND SO YOU WILL NEED TO PAY TO HAVE IT REPLACED. CONSIDER USING AN OLDER PHONE YOU CAN REMOVE THE BATTERY FROM. YOU CAN GET A CHEAP FREQUENCY DETECTOR TO SEE IF YOUR PHONE IS TRANSMITING.

    Did you like this comment? 8
    Reply
    • Ask A Prepper Staff says:
      2 months ago

      You are definitely on to something there.

      Did you like this comment? 1
      Reply
  3. The Southern Nationalist says:
    2 months ago

    My generation grew up without these things and for us, the phone was mounted on a wall in the house.
    When I got my first cell phone I figured to only use it when I need it so the idea was to keep it in the glove box and have it turned off so as not to drain down the battery.
    Fast forward to today and it has become something carried daily.
    If I didn’t have children and grandchildren I probably would leave it still in the glove box and turned off.

    Did you like this comment? 6
    Reply
    • City Chick says:
      2 months ago

      My phone is still mounted on the wall in my kitchen, and I still have additional hard-wired phones around the house. There is one in each bedroom and there is at least one on each floor. If I’m not home, the caller can leave a message. Hard wired there is no battery that one needs to be mindful of and best of all, I always know where the phone is with no problem.

      Did you like this comment? 4
      Reply
    • Ozark Hillbilly says:
      2 months ago

      People laugh but the whole concept of the Smartphone (not the cellular system but the added functions) all started with teenagers who watched the original Star Trek series. They all wanted “tricorders” to do stuff with and when they grew up this new “cellular phone system” gave them the platform to create those “tricorders” combined with “communocators”! Science fiction to reality.

      Did you like this comment? 3
      Reply
  4. WJBN says:
    2 months ago

    “to pinpoint your location within a few miles or even a few meters.”
    Brother…
    Stop mixing Metric and English measurement systems

    Either use the Beast Units or Old Money Units of measure

    It’s much more civil to be consistent…

    Did you like this comment? 4
    6
    Reply
  5. Gator says:
    2 months ago

    If I wasn’t already paranoid this article made me be. I don’t know all these apps and stuff. I was going to go to the phone store soon and remove all unused apps but now I will go today now. I don’t doubt the Patriot act an AI track everyone on foot, car or phone. Is a landline even available today?

    Did you like this comment? 4
    Reply
    • Ask A Prepper Staff says:
      2 months ago

      You’re not paranoid. just aware, and that’s a good thing. Removing unused apps is a smart first step; it limits data leaks and background tracking many people don’t even realize happens. You don’t have to be tech-savvy overnight. Just focus on keeping only what you use and checking app permissions. As for tracking, yes, modern systems under laws like the Patriot Act give agencies access to phone and digital data, but that doesn’t mean everyone is being watched in real time, it’s targeted and limited by legal and technical constraints. Landlines do still exist and offer a bit more privacy since they don’t transmit location data, but they’re not foolproof either, especially with most now using digital or VoIP systems. The key is balance. Simplify your digital life, use what’s necessary, and stay informed instead of fearful.

      Did you like this comment? 3
      Reply
      • Ozark Hillbilly says:
        2 months ago

        Prepper Staff – Furthering the points you responded with. Landline does not need to transmit location because it is a known and fixed. 100% of data mining and tracking is for commercial use and targeting (ads, scams, direct sales, etc), warrant searches are not even one one billionth of the data gathering effort. All that data is all supplied via your apps, games, and billing agreements. Knowing where you as a specific individual are is not a government priority for anyone unless you are doing something illegal or someone has asking to find you (lost). Baseline knowledge there are various cellular coverage areas (large to small) consisting of cells, microcells, picocells, femtocell. The denser the population (customers) or higher usage (cities) the smaller each coverage area (lots of users equals lots of cells) and more detailed location triangulation possibility. Assuming you are not a criminal nor terrorist lets do a logic exercise. A random person in town going to Walmart, only advertisers care and are willing to pay for that info which is collected with your permission (apps). A patriot protesting on Jan 6th has cell phone pings that proves they were in a park and not at nor in the capital, that is a good alibi. Local event like a tornado, earthquake, wild fire, or hurricane, being able to be located via triangulation from cell towers if hurt or trapped is a good thing. Regional SHTF event, maybe if the power is still working the regional government wants to spy on you and steal your preps. Are you really that hard to find? I am not since the road my farm and house is on is my sir-name, named after my grandfather. Similarly we all know the Pettimores lived on Copperhead Road. If you have a great local community you are not hiding from anyone, just the way it is. So maybe in an urban or suburban environment you start to get to a tracking issue situation. A TEOTWAWKI event, no power, no one working at the phone companies, zombies walking the roads, and no one is taking time to search archived phone data to figure out where you buried your stash via cell tower triangulation. Reducing digital footprint will reduce scam call and targeted ads but for true prepping effort you are better off focused on canning and gardening than worrying about the three letter agencies. Just my opinion.

        Did you like this comment? 5
    • Ozark Hillbilly says:
      2 months ago

      Gator – All major phone companies are seeking legislation that allows the discontinuation of physical wiring to residences and businesses. The reason is simply cost. Cost to install, maintain, and repair versus revenue generated via the physical landlines. If that legislation passes then the phone companies will replace all existent land lines with new technologies weather you ask for it or not. If you order a “landline” today you will likely receive a fixed base cellular box that plugs into you structure’s Network Interface Device (box on the side of the house) and will likely has some form of pizza-box antenna to be installed facing the nearest cellular tower. Inside the structure you have a tradition wall, desk, or wireless phone set to use but the actual signal transmission is cellular. The advantage of fixed base cellular over regular cellular is the power level of transmission, which is beneficial in rural areas with obstructions and long distances to the towers. It may work well in a place where regular cell phones struggle.

      Did you like this comment? 2
      Reply
      • KRE says:
        1 month ago

        As Always, Impressed with Ozark.

        You brought up several points I didnt think of, and I thought I was well schooled.

        I bet you know this part, but just didnt mention it. if you READ your user agreement on YOUR PHONE, most will find out you dont own the phone. they dont want it back, just THEY WANT THE CONTROL. Data mining, they make a lot of money that way. Some tablets etc, they seem to sell way too cheap, now you know why. Apps, Data, thats where the profit is.
        SO, TLA’s three letter agency’s, all they need to do is ask goo g elie
        So, switch to the DUCK ! much less tracking. The big G they have a file cabinet full on each of us, they know more about you than you or your spouse know about you.

        Did you like this comment?
  6. Outer Spice says:
    2 months ago

    I’m more concerned with the tech. geeks ….stealing your I.D….draining your bank account…While they are sitting in the middle of the Amazon Rain Forest…..which i hope the 3 letter agency’s can focus on…..

    Did you like this comment? 5
    Reply
    • Kre says:
      1 month ago

      how about the Chinese
      they have back door into all 5 G

      for most people, that means YOU gave them your bank info, etc

      So, you wake up, and from 2 AM to 6 AM everyone in the eastern half of the country had accounts drained, C Cards MAXED, real estate SOLD, etc etc

      an hour later, the western half is also sold, maxed, drained etc

      AND then all Electric, water, sewer, transit, shut off, grid crashed and un able to re boot any time soon

      SO, should we worry about TLA’s tracking us ?
      30 Million already recorded and preserved by NSA illegal phone taps ?
      Global warfare , electronically

      Like others said, dont do bad things, dont talk about prepp details, and always act like they ARE listening, because likely they are.

      Did you like this comment?
      Reply
  7. PT says:
    2 months ago

    All you accomplish is making yourself suspicious and someone to check out.
    With new tech even if you don’t have your phone you are picked up by someone’s who is near you and it’s a longer range than you think. The push for ALL your IDs and banking services on phones make it necessary to take it with you wherever you go. Don’t worry they are going to change this too and tag people like animals. If you’re not tagged you are no longer part of their system. We all know what that is. Don’t waste your time trying to hide from them esp. if you don’t have a reason to hide. Prepare yourself for the real deal that is around the corner. God Help us ALL.

    Did you like this comment? 8
    Reply
  8. crazysquirrel says:
    2 months ago

    Lucky me I haven’t had any kind of phone in years.
    About modern phones – most now come with eSIMS which cannot be removed. Batteries that cannot be removed either (presumably when the battery goes bad like they do, you have to buy another new phone – what a racket).
    I believe the EU is putting a stop to all this.

    Now if you think you are being targeted then clear as many apps as possible, charge the battery full, turn down the volume to zero, dim the display, place in low power mode, place phone in a freezer zip lock baggie, then toss into the back of an interstate truck.

    Another idea is to accidentally ‘drop’ your phone some place where you know teenagers or bad folks will find it and grab it up. Not THAT would be interesting… lol

    Stalkers (government included) will have a fun time tracking you.
    Another option is to bury the same setup in the back seat crack of a taxi or uber.
    As they drive around, it will make the stalkers go nuts trying to figure out what you are doing and where you are going.
    Don’t use airplane mode as you WANT them to track the phone.

    You should be good for about a week like that lol.

    About burner phones – no matter where you get a phone, you are ON CAMERA.
    Biometrics can tie you to the phone you buy.

    Did you like this comment? 5
    Reply
  9. Steve Entz says:
    2 months ago

    I think it is important to say that most late model vehicles also have electronics that can and are being tracked. These vehicles are being “updated” regularly and you can be sure that travel data is part of what they upload from your car. I sure don’t know how to turn that off.

    Did you like this comment? 6
    Reply
  10. Syna World says:
    2 months ago

    Syna World is a contemporary streetwear brand that blends creativity, culture, and confidence. Known for its premium materials, bold designs, and minimalist aesthetic, it represents individuality and modern expression. Each piece embodies artistic energy and urban sophistication, making Syna World a standout name in today’s evolving fashion landscape.

    Did you like this comment? 1
    2
    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

FOLLOW US ON:

PREPPER RECOMMENDS

U.S. NUCLEAR TARGET MAP. DO YOU LIVE IN THE DEATH ZONE?

IF YOU HAVE THIS ON YOUR PROPERTY, HIDE IT IMMEDIATELY

HOW TO MAKE BLACK POWDER AT HOME

THE ANTIBIOTIC YOU CAN SMOKE

BACKPACK-SIZED WATER GENERATOR CAN MAKE YOU 40 GALLONS OF PURE WATER PER DAY

THE CRISIS THAT ENDS AMERICA

Dollar Apocalypse Survival Guide

RECOMMENDED READS

HOW TO MAKE THE LONG-LASTING NATIVE AMERICAN’S WOJAPI SAUCE

HOW TO MAKE POTTED MEAT

HOW TO OPEN A CAN WITHOUT A CAN OPENER

THE PIONEER DISH THAT NEVER ENDS: PERPETUAL SOUP (STEW)

A NAVY SEAL’S BUG-IN GUIDE BOOK REVIEW

WHAT YOU REALLY NEED IN YOUR SHTF FIRST AID KIT

WATCH NOW

Banner TLW2

How to Make The Amish Fridge That Needs No Electricity

How To Looter-Proof Your Property

What Happens When You Bury a Trash Can in Your Backyard AWA



Why You Should Have a Blue Roof

Logo Header

LATEST ARTICLES

Car Thunderstorm house in field

The Only Way to Protect Your Entire Car Against an EMP

November 25, 2025
how to remove sutures yourself

How To Remove Sutures Yourself

November 24, 2025
FEMA under martial law

My Father Was a FEMA Insider….This Is What He Told Me

November 24, 2025

TRENDING POSTS

12 POWERLESS ITEMS TO HAVE WHEN THE GRID GOES DOWN

DIY CIVIL WAR NEOSPORIN RECIPE

ADD THESE TO YOUR PANTRY WHILE YOU CAN STILL AFFORD THEM!

WHY ARE YOU STILL THROWING THIS AWAY?

RECOMMENDED WEBSITES

PATH TO SURVIVAL

THE ECONOMIC COLLAPSE

TRUE PREPPER

Copyright © 2014-2025 Ask a Prepper
Terms of Use | Privacy Policy | Contact

Manage Consent

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site, we will assume that you are happy with it. Privacy Policy

Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
  • Home
  • Editor’s Pick
  • Prepping
  • Survival
  • How To’s
  • Food
  • Guides
  • Store
  • Staff
  • About Claude Davis

Copyright © 2014-2025 Ask a Prepper
Terms of Use | Privacy Policy | Contact