Category Archives: G-2

The winning stock market strategy right now

BC commenter RagnarD:

5 to 10 acres in a defensible place with an off the grid water source. Greenhouse. Fractional precious metals in .223, .40, .45, .22LR, etc. Some stock like chickens, a pig or two, beef on the hoof. Hunting skills. Stashed starches in enough quantity to live for at least two years. Heirloom seeds.

Hard times are coming. Harder than most Americans can even imagine. Harder even than The Great Depression. Root, hog, or die, and the weakest go to the wall. Those who survive the culling will create a society with a low tolerance for bullshit and high expectations of the people it accepts as full fledged members.

I hope that’s what the unculled do. Hope is not a plan.

Comments Off on The winning stock market strategy right now

Filed under G-2, Idea War, Resisters

Cyberwarfare joins the curriculum at service academies

http://www.stripes.com/news/cyberwarfare-joins-the-curriculum-at-service-academies-1.158642

It is good to teach young butter bars cyberwar, but there are millions of their contemporaries in the general population who already have madder skills than these proto-Regulars will ever acquire on .gov’s dime. Whose job is it to seek out civilian irregular information operators and rally them to the .gov side?

Comments Off on Cyberwarfare joins the curriculum at service academies

Filed under G-2

Website hopes to put spotlight on crimes of LRA

http://www.lracrisistracker.com/#about

http://www.stripes.com/news/website-showing-african-rebels-movements-attracts-interest-1.158081

Civilian Irregular Information Operators.

Comments Off on Website hopes to put spotlight on crimes of LRA

Filed under G-2

Chinese military mobilises cybermilitias

http://www.ft.com/cms/s/0/33dc83e4-c800-11e0-9501-00144feabdc0.html#axzz1adjgTg66

The cybermilitia’s tasks include “stealing, changing and erasing data” on enemy networks and their intrusion with the goal of “deception, jamming, disruption, throttling and paralysis”

What capability does the U. S. military have to mobilize American cybermilitias?

Comments Off on Chinese military mobilises cybermilitias

Filed under G-2

Interim Security of Critical Infrastructure

. . . an all-volunteer local defense force that vastly outnumbers the approximate number of insurgents in the district. Capt. Paul J. Kasich, the commander of the Marine police mentoring team in Marjah, estimates ISCI to be almost the size of a battalion.

At that size, ISCI is approximately three times larger than the insurgent force in Marjah was last summer, when resistance to coalition forces was notably stronger. At that time, there were between 200 and 300 insurgents, according to a Small Wars Journal article written by Brett Van Ess last July.

The emergence of ISCI has several implications regarding the counterinsurgency campaign in Marjah. The first is coalition forces obvious size advantage – ISCI being only a sliver of the total coalition force, which also includes a Marine battalion, an Afghan National Army Kandak, and various departments of Afghan National Police.

The deeper implication, however, lies in the composition of the force itself. Unlike the ANA and ANP, which are comprised of Afghans from all over the country, the ISCI is made up entirely of local citizens led by local elders. Members of ISCI patrol their own neighborhoods, which are delineated by a canal system the U.S. helped build during the 1950s. In essence, the local ISCI force represents a grass-roots resistance to insurgents.

Healing the Bleeding Ulcer: A more hopeful prognosis in Southern Helmand province

Comments Off on Interim Security of Critical Infrastructure

Filed under G-2

The story of America’s victory over terror in Mesopotamia needs to be told.

Memorial Day: The War in Iraq

Comments Off on The story of America’s victory over terror in Mesopotamia needs to be told.

Filed under G-2

Getting Too Hard To Blog Out Here

Baba Tim thinks so, too.
CIIDG will eventually come up again. Eventually.

Comments Off on Getting Too Hard To Blog Out Here

Filed under G-2

Comments Are Closed

You can still email crusader_3_alpha@yahoo.com or tweet @cannoneerno4. Sorry. No longer have the leisure time available to deal with the spam.

Comments Off on Comments Are Closed

Filed under G-2

Blogging Will Be Light . . .

. . . to nonexistant for awhile. Sorry. Other priorities. Check the archives for an idea of where I am. I’m there again. My apologies for all the spam in the comments. Haven’t had opportunity to clean it up.

1 Comment

Filed under G-2, The Forgotten War

Stealth Black Hawk down: revised sketch (via David Cenciotti’s weblog)

SEALs don’t fly these, they ride in them. Blowing it in place rather than attempting to recover it seemed odd to me when they were telling me it was a Blackhawk.

Stealth Black Hawk down: revised sketch Here's the new version of the famous Black Helo which crashed during the Osama Bin Laden raid.  I've studied the details that surfaced in the last few hours and after reviewing the many feedbacks I've received (with suggestions, speculations, etc) Ugo Crisponi of Aviation Graphic has created another (more realistic) version of the helicopter. Thanks to all those who left comments to the yesterday's article. … Read More

via David Cenciotti's weblog

Comments Off on Stealth Black Hawk down: revised sketch (via David Cenciotti’s weblog)

Filed under G-2

Ba-a-a-a

Comments Off on Ba-a-a-a

Filed under G-2

And I Ain’t Done, Yet


visited 35 states (70%)
Create your own visited map of The United States


visited 19 states (8.44%)
Create your own visited map of The World

Where have YOU been?

1 Comment

Filed under G-2

Building Snowmobiles: For Total War And Netwar, You Need Both A ‘Defense Industry’ And An ‘Offense Industry’ | Feral Jundi

Building Snowmobiles: For Total War And Netwar, You Need Both A ‘Defense Industry’ And An ‘Offense Industry’ | Feral Jundi.

I tried commenting and got

Sorry

Your comment is a little too long. Try splitting it into multiple comments.

So I’ll comment on my own blog and feraljundi can read what I have to say over here.

What about the police, both federal and state?  With transnational terrorists, criminal organizations etc., are there enough law enforcement to keep up with the deluge? In both the military and police examples, I do not think that they can match the size, spread and scope of today’s miscreants.  An example is the drug war against the cartels. It is overwhelming the Mexican government, and the US is not doing that great of a job either, despite all the efforts of law enforcement.

The “drug war” down in Mexico is really just a turf battle between the cartel calling itself los Estados Unidos Mexicanos and the other cartels. The “drug war” in America is just Prohibition, rebranded from anti-booze to anti-“drug.” Think about when in American history opium, cocaine, & all the other “drugs” were demonized, outlawed, and “made war” upon. The “war on drugs” serves a purpose for those profiting from fighting it, & for that reason is unlikely to be won until all the junkies & recreational users are too broke to buy.

In the war against these folks like Al Qaeda, pirates or the cartels, I have doubts that there are enough military, police or intelligence assets to keep up with the formation of all of these networks.

I am absolutely certain there are not “enough” military, police or intelligence assets to keep up with the formation of all of these networks. Who would decide how many are “enough?” Enough to prevent another 9/11? Enough to prevent a cyber Pearl Harbor? There will never be “enough.” Not having “enough” is the default CYA excuse for not getting the job done with what they already have & the rationale for expanding their empire.

What I think is missing in this war, is a licensed and regulated market that profits from our enemy’s destruction. One created to promote netwar (or whatever works). That last part is crucial.

What I think is missing in this war is leadership that sincerely wants to destroy our enemies & can coherently communicate to the American taxpayer who those enemies are, what we’re doing to destroy them, when we can reasonably expect their destruction to be completed, where we intend to destroy them and why they need to be destroyed.

Also, it should be the goal of politicians and war planners to win the war as quickly as possible, once a war has been deemed necessary to fight.

Should be, but the real goal of  politicians in power is to take credit for a successful and cheap war, while the real goal of politicians out of power is to make the politicians in power look like such douche bags that the voters turn them out next election, and the real goal of war planners is to protect their rice bowl and make their service/branch more respected and better funded.

Total war means no holds barred, no quarter given, no sacrifice too great, employment of Weapons of Mass Destruction, conscription, internment of enemy nationals, assumption of dictatorial powers by the Commander-in-Chief, government control of just about everything.  You only want to go that far when the survival of your Westphalian nation-state is in doubt.  Al Qaeda isn’t worth all that.

3 Comments

Filed under G-2

The Tripoli Post – Al Qathafi Loyal Troops Starting to Crumble Under Pressure

 

Comments Off on The Tripoli Post – Al Qathafi Loyal Troops Starting to Crumble Under Pressure

Filed under G-2, Info Warriors, Morale Operations, PSYOP

Operation Odyssey Dawn explained (Day 7) (via David Cenciotti’s weblog)

David Cenciotti is an Italian ex-fighter jock aviation journalist blogging in English.

Operation Odyssey Dawn explained (Day 7) Previous debriefings: Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 With Libyan known SAM sites and air defence installation rendered harmless, Odyssey Dawn missions see the coalition planes focusing mainly on targets of opportunity, as the regime's armored forces and mechanized troops outside Ajdabiyah, a city located to the south of the rebel stronghold of Benghazi were British and French planes were involved in repeated attacks on the Gaddafi forces on … Read More

via David Cenciotti's weblog

Comments Off on Operation Odyssey Dawn explained (Day 7) (via David Cenciotti’s weblog)

Filed under G-2, Info Warriors

Anonymous are not at all what people think they are

HBGary’s Hoglund sheds light on Anonymous

There aren’t very many, first of all. There are not thousands, they are not a legion. That is all just stuff they say to make people fearful or intimidate. They have a whole propaganda wing. So lets get this straight: A lot of the people in Anonymous are pseudo-journalists, they write the news. They completely use the media as a tool.

There are a dozen people at the center of Anonymous. Most of those people are criminal hackers. And they are not just attacking HBGary, they are attacking numerous defense contractors who are in the defense industrial base and system integrators for the government. They are attacking numerous companies in the pharmaceutical space and the chemical space. They are attacking U.S. corporations.

They are singling out individuals within the defense establishment. We are talking about stuff where they are targeting people who are part of the Department of Defense or the intelligence community. Literally, they are putting all their personal information into planning documents — they are targeting these people. They are going after people’s family and children. They actually have all the family members listed. And they call them up on the phone. They harass them. There have been cases where death threats have been left. It’s just ridiculous, and it’s completely unacceptable. I had no idea about any of this before I was attacked.

Comments Off on Anonymous are not at all what people think they are

Filed under G-2

Anonymous Planning Media War in Support of Manning

Anonymous Planning Media War in Support of Manning.

“The Internet is a weapon. It’s already weaponized, and those of us who know how to use this weapon have the advantage. I know who else was involved in turning [Manning] in. I’m not sure what to do on that yet, but we’re speaking among ourselves abut [sic] that,” self-styled Anonymous spokesman Barrett Brown told Steve Ragan of The Tech Herald.

1 Comment

Filed under G-2, Info Warriors, IW, Moonbats, Old Media

Anonymous and Tunisia: A New Cyber Warfare?

Anonymous and Tunisia: A New Cyber Warfare?.

Anonymous certainly didn’t bring down the Tunisian government, and it may not have even altered the landscape of the Tunisian media. But its digital-collective involvement in an intrinsically domestic conflict was undeniably a first. Inspired by the struggles of a repressed Tunisian citizenry, a stateless, international group of free-speech advocates took it upon themselves to engage in a still-undefined form of guerilla warfare. Their tactics are unproven, and their success is undetermined.

Comments Off on Anonymous and Tunisia: A New Cyber Warfare?

Filed under CNA, G-2, Info Warriors, IW, PSYOP

Anonymous Plans to Implement P2P (via T3h H3r0d07u5 R3p0r7)

Anonymous plans to implement P2P into their DDoS attack strategy, according to a recent posting on pastebin.com. Called "Ghost-P2P", the platform will incorporate a "target voting" feature that will enable participants to vote on DDoS targets to be attacked using LOIC, an open source network stress-testing application. LOIC was recently used by Anonymous to carry out DDoS attacks as part of Operation Payback. "One of the most unspected [sic] appl … Read More

via T3h H3r0d07u5 R3p0r7

Comments Off on Anonymous Plans to Implement P2P (via T3h H3r0d07u5 R3p0r7)

Filed under G-2

Become A Cyber-Scout, Clean Up Thailand’s Internet! (via Saiyasombut)

H/T: Evgeny Morozov

Originally published at Siam Voices on December 17, 2010 In an everlasting attempt to uphold its image as a fierce defender of the royal institution and thus effectively controlling a national narrative the Thai government now sets its aims into the online world. The ministry of justice, where the Democrat party is in charge, has set up a so-called ‘Cyber Scout’ training programme for next week December 20-21 at Kasetsart University. On their web … Read More

via Saiyasombut

See also Cyber Scout: Thailand’s internet police?

Comments Off on Become A Cyber-Scout, Clean Up Thailand’s Internet! (via Saiyasombut)

Filed under G-2, IW, PSYOP Auxiliaries