Category Archives: Info Warriors

Support The Jester

Support «.

Many people have expressed and continue to express their wish to donate financially to me. This is something I have had to think long and hard about. While I would never demand or ask for cash, I recognize the need for people who support my actions wishing to show this by donating. So in order to satisfy this requirement,  I have come up with the following:

click http://th3j35t3r.wordpress.com/support/ and see.

Comments Off on Support The Jester

Filed under Heroes, Info Warriors, Morale Operations

The Tripoli Post – Al Qathafi Loyal Troops Starting to Crumble Under Pressure

 

Comments Off on The Tripoli Post – Al Qathafi Loyal Troops Starting to Crumble Under Pressure

Filed under G-2, Info Warriors, Morale Operations, PSYOP

Operation Odyssey Dawn explained (Day 7) (via David Cenciotti’s weblog)

David Cenciotti is an Italian ex-fighter jock aviation journalist blogging in English.

Operation Odyssey Dawn explained (Day 7) Previous debriefings: Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 With Libyan known SAM sites and air defence installation rendered harmless, Odyssey Dawn missions see the coalition planes focusing mainly on targets of opportunity, as the regime's armored forces and mechanized troops outside Ajdabiyah, a city located to the south of the rebel stronghold of Benghazi were British and French planes were involved in repeated attacks on the Gaddafi forces on … Read More

via David Cenciotti's weblog

Comments Off on Operation Odyssey Dawn explained (Day 7) (via David Cenciotti’s weblog)

Filed under G-2, Info Warriors

Like a Blind Hog . . .

. . . even the NY Slimes finds an acorn every once in a while, then they bury it on page B3 of the Sunday edition.

“. . . bloggers and hundreds of ordinary people stepped into the role of citizen journalists and shared their experiences, cellphone photos and videos online.
There was a whole army of people who did the job of reporters, sharing what was happening on the streets,”

This whole army of uncredentialed, ununionized, amateur people doing the jobs professional reporters used to do are Civilian Irregular Information Operators.

The last survivors of the Old Media are migrating online and attempting to recruit New Media types whose writing styles and ideological outlook don’t clash too much with the dead tree edition.

Comments Off on Like a Blind Hog . . .

Filed under Info Warriors, Old Media

Anonymous Planning Media War in Support of Manning

Anonymous Planning Media War in Support of Manning.

“The Internet is a weapon. It’s already weaponized, and those of us who know how to use this weapon have the advantage. I know who else was involved in turning [Manning] in. I’m not sure what to do on that yet, but we’re speaking among ourselves abut [sic] that,” self-styled Anonymous spokesman Barrett Brown told Steve Ragan of The Tech Herald.

1 Comment

Filed under G-2, Info Warriors, IW, Moonbats, Old Media

Civilian Irregular Computer Network Attackers Noticed by @Strategypage

Information Warfare: We Are Not Amused.

China [is] one of many nations taking advantage of the Internet to encourage, or even organize, patriotic Internet users to obtain hacking services. This enables the government to use (often informally) these thousands of hackers to attack targets (foreign or domestic.) These government organizations arrange training and mentoring to improve the skills of group members. Turkey has over 45,000 of hackers organized this way, Saudi Arabia has over 100,000, Iraq has over 40,000, Russia over 100,000 and China, over 400,000. While many of these Cyber Warriors are rank amateurs, even the least skilled can be given simple tasks. And out of their ranks will emerge more skilled hackers, who can do some real damage. These hacker militias have also led to the use of mercenary hacker groups, who will go looking for specific secrets, for a price. Chinese companies are apparently major users of such services, judging from the pattern of recent hacking activity, and the fact that Chinese firms don’t have to fear prosecution for using such methods.

The U.S. has one of the largest such informal militias, but there has been little government involvement. That is changing. The U.S. Department of Defense, increasingly under hacker attack, is now organizing to fight back, sort of. Taking a page from the corporate playbook, the Pentagon is sending off many of its programmers and Internet engineers to take classes in how to hack into the Pentagon. Not just the Pentagon, but any corporate, or private, network. It’s long been common for Internet security personnel to test their defenses by attacking them. Some “white hat hackers” (as opposed to the evil “black hat hackers”) made a very good living selling their attack skills, to reveal flaws, or confirm defenses. Seven years ago, this was standardized with the establishment of the EC (E Commerce Consultants) Council, which certified who were known and qualified white hat hackers. This made it easier for white hats to get work, and for companies to find qualified, and trustworthy, hackers to help with network security. Now the Department of Defense is paying to get members of its Internet security staff certified as white hats, or at least trained to be able to do what the black hats do, or recognize it. While many in the Department of Defense have been calling for a more attack-minded posture, when it comes to those who are constantly attacking Pentagon networks, the best that can be done right now is to train more insiders to think, and operate, like outsiders.

Sending a GS-11 dues paying member of the AFGE, AFL-CIO, off to hacker school ought to give them mad skilz, fer sure.

The Regulars recruit highly intelligent, physically fit, patriotic young people in to the Armed Forces. The recruiting standards are so high few young Americans can meet them. The stereotypical fat, dope-smoking, basement-dwelling script kiddie with Cheeto-stained fingers can’t be turned into a presentable facsimile of a soldier, sailor, airman or Marine in a reasonable amount of time in this all-volunteer Politically Correct era, and in this economy the Regulars’ ability to recruit credentialed IT professionals in to the Federal Civil Service is only as good as the budget the Republican Congress appropriates for them. That also impacts the Regular’s ability to hire Civilian Irregular Information Auxiliaries from Private Military Contractors.

Regular .gov/.mil information assurers/computer network defenders/information operators can’t be given enough autonomy from the bureaucracy to compete with all the cyber criminals and anti-American cyber patriots attacking our networks. The Bad Guys will always be more opportunistic, flexible, adaptable and imaginative than Regular Good Guys will ever be allowed to be.

1 Comment

Filed under CNA, Info Warriors, IW

Cyberwar PsyOps: e-Activism and Social Media – SC Magazine US

An Amnesty International e-activist is an individual who uses information and communication tools – such as mobile phones, blogs, emails or social networking sites – to act for human rights. He or she may also organize, mobilize and inspire online communities of individuals to take action for human rights.

via Cyberwar PsyOps: e-Activism and Social Media – SC Magazine US.

Amnesty International probably would not recognize individuals who used information and communication tools – such as mobile phones, blogs, emails or social networking sites — to generate support for Operation Iraqi Freedom as having acted in support of the human rights of Iraqis persecuted by Saddam Hussein, his Former Regime Elements, Al Qaeda in Mesopotamia, and the Iranian Quds Force-backed Shiite militias. 

American and Coalition soldiers, Marines, airmen and sailors were also human and had some rights  not to be lied about, slandered, libeled, misrepresented or similarly disrespected, and Counter Insurgent Supportive e-activists organized, mobilized and inspired online communities of milbloggers to take action.

Comments Off on Cyberwar PsyOps: e-Activism and Social Media – SC Magazine US

Filed under Idea War, Info Warriors, IW, PSYOP, PSYOP Auxiliaries

Sarah’s online army: Warriors ’Going Rogue’ vs Milbank’s Palin Feb. blackout – National Political Transcripts | Examiner.com

Sarah’s online army: Warriors ’Going Rogue’ vs Milbank’s Palin Feb. blackout – National Political Transcripts | Examiner.com.

Obama’s online army got him elected.  Sarah was on the receiving end of their information operations.  The defeated usually learn more from the last war than the victors.  Her info operators will be opposing his all over cyberspace.

Comments Off on Sarah’s online army: Warriors ’Going Rogue’ vs Milbank’s Palin Feb. blackout – National Political Transcripts | Examiner.com

Filed under Idea War, Info Warriors, Resisters

Anonymous and Tunisia: A New Cyber Warfare?

Anonymous and Tunisia: A New Cyber Warfare?.

Anonymous certainly didn’t bring down the Tunisian government, and it may not have even altered the landscape of the Tunisian media. But its digital-collective involvement in an intrinsically domestic conflict was undeniably a first. Inspired by the struggles of a repressed Tunisian citizenry, a stateless, international group of free-speech advocates took it upon themselves to engage in a still-undefined form of guerilla warfare. Their tactics are unproven, and their success is undetermined.

Comments Off on Anonymous and Tunisia: A New Cyber Warfare?

Filed under CNA, G-2, Info Warriors, IW, PSYOP

We live in a world where a few top-quality hackers can accomplish a considerable amount of damage at the national and strategic level.

Cyberwar Case Study: Georgia 2008 ( http://smallwarsjournal.com/blog/journal/docs-temp/639-hollis.pdf )

Read the whole thing, then come back and think about:

. . . There was another historically unique and critical aspect to the fighting – the emergence of synchronized cyberspace domain actions as an intelligence indicator for strategic, operational, and tactical level military operations. Unlike the (alleged) Russian cyberattack upon Estonia in 2007, the (alleged) Russian cyberattack on Georgia was accompanied by physical domain combat between Russian and Georgian military forces. The (alleged) Russian network attack operations in virtual cyberspace occurred prior to hostilities and later mirrored (apparently synchronized with) Russian combat operations in the land warfighting domain.7 These attacks included various distributed denial of service (DDOS) attacks to deny/disrupt communications and information exfiltration activities conducted to accumulate military and political intelligence from Georgian networks. These attacks also included web site defacement for Russian propaganda purposes.8 One of the first elements of Georgian society that were attacked was a popular hacker forum – by attempting to take out Georgian hackers, Russian-supported hacker militia preemptively tried to forestall or mitigate a counter-attack (or returning fire) from Georgian hackers.9 What is not widely known is that pro-Georgian hackers made limited but successful network counter-attacks against Russian targets.10 Hacker wars between (often quite talented) patriotic amateur hackers, cyber militias, and organized criminal gangs have become a widely accepted de facto form of nation-state conflict over the past twenty years (for example: Israeli vs Arab/Muslim (Sept 2000), India vs Pakistan, US vs China (April-May 2001), Russian vs Estonia (April-May 2007), etc…). These non-governmental national assets are generally used for the traditional purposes of imposing one nation’s will and conditions upon another.

Two and a half years later and we can only allege? That’s the plausible deniability irregular information operators offer.

One of the first targets of enemy Civilian Irregular Information Operators will be friendly Civilian Irregular Information Operators.

What are some of the operational and intelligence lessons that can be drawn from these conclusions? First, for Russia or China to employ their people’s patriotic ‘hacker militia’ to conduct a network attack against a target nation-state, they must engage them first – to motivate and ‘sell’ them on the concept; steer them toward appropriate targets; synchronize those cyberspace operations with combat activity in the physical realm; and discuss the most effective cyberspace tactics, techniques and procedures (TTPs) to be used. The patriotic hackers and cyber militias need to be focused by the aggressor government against the opponent‟s center of gravity and their activities to be synchronized with attacks against that center of gravity from the other domains. These hackers and cyber militias need to understand the opponent‟s center of gravity in order to develop cyberspace domain approaches and techniques to effectively attack it. These preliminary cyberspace activities often create an identifiable signature that can be tracked and monitored in advance of combat operations. Nations need to monitor hacker chat rooms and communications of potential aggressor nations in order to intercept and understand this activity.

How would the United States employ our people’s patriotic ‘hacker militia’?
What arm of the fedgov.mil octopus could engage them, motivate and ‘sell’ them on the concept, steer them toward appropriate targets; synchronize those cyberspace operations with combat activity in the physical realm; and discuss the most effective cyberspace tactics, techniques and procedures (TTPs) to be used?

Nobody in our .gov/.mil could overtly engage them without suffering political retribution from Legislative/Executive branch elements that do not want American patriotic hacker militias engaged. That leaves former or retired .gov/.mil beyond the reach of retribution, and contractors that don’t get much political oversight.

Russian-oriented hackers/militia took out news and local government web sites specifically in the areas that the Russian military intended to attack in the ground and air domains. The Federal and local Georgian governments, military, and local news agencies were unable to communicate with Georgian citizens that were directly affected by the fighting. This provided an intelligence indicator of the ground and air attack locations. It created panic and confusion in the local populace, further hindering Georgian military response. This effect also provides a future aggressor nation with an opportunity to conduct military deception operations via feints and ruses to mislead the target nation population, government, and military. A sudden „blackout’ of cyberspace activities in a specific region may provide an indicator of a tactical or operational level conventional attack. Or it could be used as a sophisticated cyberspace operation as part of a larger deception plan, creating a feint in the cyberspace domain to lure opposing forces into believing an attack is imminent in another warfighting domain. Use of patriotic hackers and cyberspace militia themselves might be a deception effort to attract the target nation‟s attention away from the aggressor nation‟s top-quality military and intelligence community cyberspace operators that quietly conduct the main effort in the overall cyberspace domain operation.

Are we even allowed to use MILDEC anymore? Could any U. S. MILDEC’ers work by, with and through American patriotic hackers and cyberspace militia?

In future combat, aggressor nation patriotic hacker militia can be called upon to conduct cyberspace fire & maneuver operations performed directly in support of forces in other domains, They could also be extensively utilized to conduct deception efforts in cyberspace in support of operations in the other domains or to act as a distraction for other cyberspace operations conducted by government professionals against target nation high value targets (HVT).

UPDATE 012911: This Week at War: Lessons from Cyberwar I

5 Comments

Filed under CNA, CND, Info Warriors, IW, PSYOP Auxiliaries

Why Israel Is Losing The Information War – Big Journalism

Why Israel Is Losing The Information War – Big Journalism.

Comments Off on Why Israel Is Losing The Information War – Big Journalism

Filed under Info Warriors, PSYOP

Estonian Civilian Irregular Information Defense Group

Volunteer Cyber Army Emerges In Estonia

Maybe it won’t be an all-volunteer Cyber Army.

Conscripting Cyber Experts to Protect IT Infrastructure

There is enough national unity in Estonia to have a Cyber Defense League. In America, the usual suspects would beat it to death through PSYOP in the media and LAWFARE in the courts.

Small Wars Council discussion here.

Comments Off on Estonian Civilian Irregular Information Defense Group

Filed under CND, Info Warriors, IW, Lawfare, PSYOP

Concerned net users scouring the net for possible examples of crime and reporting it

EU could turn to ‘crowd sourcing’ in cyber crime fight

Don’t know much about “crowd sourcing.” Sounds more like a a Neighborhood Watch for the internet. The tipsters would be Civilian Irregular Information Operators, of a kind, lower-level volunteers for the “virtual militia.”

Comments Off on Concerned net users scouring the net for possible examples of crime and reporting it

Filed under Info Warriors, IW

Who is th3j35t3r? (via T3h H3r0d07u5 R3p0r7)

Who is th3j35t3r? Report #THR20101217A Release Date: 12.17.2010 Executive Summary The hacktivist who goes by the handle "th3j35t3r" has been carrying out denial of service (DoS) attacks against suspected jihadist websites since he showed up on the hacktavism scene on January 1, 2010. He uses a DoS tool called XerXes that he claims to be the sole author of. He also claims to be "an ex-soldier with a rather famous unit" and to have served two tours of duty as an air … Read More

via T3h H3r0d07u5 R3p0r7

Comments Off on Who is th3j35t3r? (via T3h H3r0d07u5 R3p0r7)

Filed under G-2, Heroes, Info Warriors, PSYOP Auxiliaries

Red Hackers Alliance

CHICOM Civilian Irregular Information Operators Harnessing Hacker Hatred.

The RHA has a paid staff, including university trained network security experts. Officially, the RHA provides training and advice about network security. But the RHA has also apparently absorbed the thousands of Chinese hackers who used to belong to informal hacker organizations. These groups often openly launched Cyber War attacks against foreign targets. One of the more notorious examples of this was in the Spring of 2001, when outraged Chinese hackers went after American targets in the wake of a Chinese fighter crashing, after colliding with an American P-3 patrol aircraft. American hackers fought back, and apparently there was more damage on the Chinese side. This offended the Chinese hackers a great deal, and they vowed to not fail in the future.

American hackers prevailed 9 years ago. Will anything useful be accomplished by them next time?

By, With, and Through, you Regulars. Plausible Deniability.

Does the TEA Party have sympathetic hackers on their side? Democrats did two years ago, now, not so much. Do the RINO’s have any Cyber capability at all?

China’s Restless Hackers, 2006/04/18

Red Chinese Cyber-Militia, 2008/05/29

Chinese Cyber Warriors, 2008/08/18

Comments Off on Red Hackers Alliance

Filed under CNA, Info Warriors, IW

Facebook MILDEC

Military Deception.
Social Networking.
Smart phones on the battlefield.
Psychological warfare.

IO, baby.

Shamelessly stolen from Delta Bravo Sierra in a heinous act of copyright violation:


Comments Off on Facebook MILDEC

Filed under Info Warriors, PSYOP

Search Engine PSYOP

Not all Civilian Irregular Information Operators are Good Guys.

REVEALED: Daily Kos’ AstroTurf Program to Manipulate Google and Trash GOP Candidates

KosKids trying to persuade, change and influence voters using deception and psychological operations in political warfare.

2 Comments

Filed under Idea War, Info Warriors, Moonbats, PSYOP

Cyber Operations Planner 2

This is the kind of job .mil is seeking contractors to do for them. Not the point of contact, so don’t ask this disgruntled former employee of that particular component of the Military-Industrial Complex for help getting this gig. Blogged here because civilian contractors hired to be cyber operations planners for Regulars are Civilian Irregular Information Operators.

Works as an Operations Analyst at the Army’s Regional Computer Emergency Response Team located at Ft. Gordon, Ga. Responsible for functions pertaining to planning, coordinating, executing, tracking, and reporting of unit operations. Supports the deployment of teams on short-notice and preplanned missions in response to computer security events at Army posts, camps, and stations around the world. Supports the development and maintenance of Tactics, Techniques and Procedures and Standard Operating Procedures. Coordinates vertically and horizontally across internal and external organizations. Responsible for matters that concern training, planning, coordination of missions, operations and plans.
Coordination based on customer needs and requirements. Evaluate and recommend uses of resources required by customer missions in order to complete successfully.

Essential Functions: Preparation, coordination, authentication and distribution of SOP, Operations Plans, Operations Orders, fragmentary orders (FRAGOs), warning orders, review of plans and orders of other departments. Reviews, disseminates and explains plans and orders of other departments to team members. Reviews customer OPLANs and OPORDs for completeness. Ensures necessary support requirements are provided when and where required for the customer. Will be responsible to complete various reports, status updates, and conduct briefings on a variety of subjects. Mission planning and data entry utilizing various mission planning and reporting software applications.

Basic Qualifications:

Exceptional communication skills, strong writing skills. Experience with Military Staff organization and operations policies and procedures is desired. Microsoft Office expertise, Military Decision Making Process (MDMP), and the Joint Operation Planning Process (JOPP), Strong customer interface skills required. Demonstrated ability to schedule and manage support requirements in a dynamic work environment. Secret Clearance required and must be clearable to TS/SCI. Bachelors Degree and 2 years experience, Masters degree and 0 years of experience, or 6 years of relevant experience in lieu of a degree.

Preferred Qualifications:

Experience in performing duties as Battle Captain are highly desired. Functional experience in S3 Operations with experience in developing Operation Orders (OPORDs), Operation Plans (OPLANs), FragmentaryOrders (FRAGOs), and Warning Orders (WARNOs) is desired. Experience with Military Staff organization and operations policies and procedures is desired. Bachelors Degree and 2 years experience, or Masters degree and 0 years of experience preferred

A Department of the Army Civilian GS-13 doing this exact same job would be a Civilian Regular Information Operator, likely a member of Local 2017, American Federation of Government Employees, AFL-CIO, and damn hard to be shed of once his services are no longer required.

1 Comment

Filed under CNA, CND, IA, Info Warriors

Zachary Chesser, Anwar Al-Awlaki and YouTube: Ah! Symbiosis! (via StarCMC’s Enemedia Roundup)

I am proud of my blogdaughter.

I have been extremely busy with a bunch of personal stuff and haven't had time to write.  I was actually taking a break with a pal last night and missed an interesting – and oh! so sweet! – bit of  news which I would normally have seen at the Jawa Report, but I got on email from a friend late last night.  It seems that RevolutionMuslim's South Park threatener Zachie-boy Chesser,  using his infant son as camouflage (what a typical terrorist thing … Read More

via StarCMC's Enemedia Roundup

3 Comments

Filed under Info Warriors, PSYOP Auxiliaries

140 Letters at a Time

Imagine “Obama is a Communist revolutionary” suddenly circulating, handwritten, on bill after bill of currency, all around the country.

Imagine “Obama is a racist” suddenly circulating, handwritten, on bill after bill of currency, all around the country.

Shabazz isn’t the least bit serious nor does he give a fuck. Intrinsically marginalized, he’s just interested in increasing membership dues

To him, he’s just slyly doing his part as the bad guy in a WWF bout. However, he’s miscalculating the seriousness of his opponent, who…

…is not ‘in” on what Shabazz’s presumes to be a universally acknowledged, tacit joke, lust like wrestling. He’s showing up to play, and..

…he’s gonna get fucking hurt. All this guy wants is the publicity necessary for a recruitment/funding surge. He’s about to find it’s…

gonna cost more than its worth, as the price of a real battle, not a fake one, always is. It’s war, homey, wake up and smell the napalm.

Buy front-and-centering all these soccer moms for a year now, the Tea Party has suckered the Black Panthers into a battle with its armed…

…combat-experienced, best-in-class-trained, elements, that he is neither numerically or tactically equipped to battle in a serious way.

Sirens, I hear ambulance sirens, and I see the loading of many black bodies than white ones.He’s a fucking lawyer by trade, for Christ sakes

This lawyer and his crew of Starbucks and Gold’s Gym Muslims are going to show up and face two divisions of combat vets. Can’t wait.

There is no way in hell that Barack Obama can any longer survive the attacking force of all of his mortal enemies: the Pentagon, Israel,…

…the anti-Iran Sunni Arab states, the entire American business community, the 40% Conservative American voting population, and, after..

…the November elections, the Democrat Party. The guy is fucking done for. For his own safety, he should head to Paraguay.

Now this is just one humble political analyst’s reading of another man’s situation, but, after careful consideration, I have to say, things

look rather grim for him. He last hope is to beat a substantial political retreat. Absent that, elements of the aforementioned forces are

likely to take grim action. That’s my objective analyst’s call.

Pat Dollard’s Twitter stream, Wed 14 Jul 0808-0813

3 Comments

Filed under Info Warriors, Pamphleteers, PSYOP