Category Archives: PSYOP Auxiliaries

Why False Enemy Propaganda Matters

The Jawa Report: Why False Enemy Propaganda Matters: German Jihadi Motivated by Fake US Soldier Rape Video.

. . . we cannot let such enemy propaganda go unchecked. It affects people. It kills people.

Propagandists with pens are sometimes just as dangerous as those with guns. Especially when the false ideas they sell reinforce a narrative where Americans are the lascivious bad guys and the Taliban and other Islamist groups are simply defending the virtue of Muslim women from them.

We have got to do better at fighting the propaganda produced by the enemy. Which is why I support YouTube smackdown. But we need to do more. We need to organize. And not simply at the individual private level. Fighting enemy propaganda needs to be higher on the priority list of both the CIA and the DOD.

And if the government won’t do this we need to change the government. In the meantime it’s up to you and me to fight the good fight. So, if you see stupid enemy propaganda fight it tooth and nail. It not only makes us look bad, but it also kills.

What arm of the Federal .gov octopus is supposed to be fighting enemy propaganda?

Now you know why America needs Civilian Irregular Information Defense Groups.


Filed under PSYOP, PSYOP Auxiliaries

Cyberwar PsyOps: e-Activism and Social Media – SC Magazine US

An Amnesty International e-activist is an individual who uses information and communication tools – such as mobile phones, blogs, emails or social networking sites – to act for human rights. He or she may also organize, mobilize and inspire online communities of individuals to take action for human rights.

via Cyberwar PsyOps: e-Activism and Social Media – SC Magazine US.

Amnesty International probably would not recognize individuals who used information and communication tools – such as mobile phones, blogs, emails or social networking sites — to generate support for Operation Iraqi Freedom as having acted in support of the human rights of Iraqis persecuted by Saddam Hussein, his Former Regime Elements, Al Qaeda in Mesopotamia, and the Iranian Quds Force-backed Shiite militias. 

American and Coalition soldiers, Marines, airmen and sailors were also human and had some rights  not to be lied about, slandered, libeled, misrepresented or similarly disrespected, and Counter Insurgent Supportive e-activists organized, mobilized and inspired online communities of milbloggers to take action.

Comments Off on Cyberwar PsyOps: e-Activism and Social Media – SC Magazine US

Filed under Idea War, Info Warriors, IW, PSYOP, PSYOP Auxiliaries

In the chatroom with the cyber guerrillas

In the chatroom with the cyber guerrillas

Global chaos is not Anonymous’ aim. As the WikiLeaks and Tunisia cases show, the group targets specific institutions and its attacks are designed to temporarily delay more than destroy. Think of them not as acts of cyber war but as high-profile guerrilla strikes.

Comments Off on In the chatroom with the cyber guerrillas

Filed under CNA, Cyber Guerrilla Chieftains, IW, PSYOP Auxiliaries

We live in a world where a few top-quality hackers can accomplish a considerable amount of damage at the national and strategic level.

Cyberwar Case Study: Georgia 2008 ( )

Read the whole thing, then come back and think about:

. . . There was another historically unique and critical aspect to the fighting – the emergence of synchronized cyberspace domain actions as an intelligence indicator for strategic, operational, and tactical level military operations. Unlike the (alleged) Russian cyberattack upon Estonia in 2007, the (alleged) Russian cyberattack on Georgia was accompanied by physical domain combat between Russian and Georgian military forces. The (alleged) Russian network attack operations in virtual cyberspace occurred prior to hostilities and later mirrored (apparently synchronized with) Russian combat operations in the land warfighting domain.7 These attacks included various distributed denial of service (DDOS) attacks to deny/disrupt communications and information exfiltration activities conducted to accumulate military and political intelligence from Georgian networks. These attacks also included web site defacement for Russian propaganda purposes.8 One of the first elements of Georgian society that were attacked was a popular hacker forum – by attempting to take out Georgian hackers, Russian-supported hacker militia preemptively tried to forestall or mitigate a counter-attack (or returning fire) from Georgian hackers.9 What is not widely known is that pro-Georgian hackers made limited but successful network counter-attacks against Russian targets.10 Hacker wars between (often quite talented) patriotic amateur hackers, cyber militias, and organized criminal gangs have become a widely accepted de facto form of nation-state conflict over the past twenty years (for example: Israeli vs Arab/Muslim (Sept 2000), India vs Pakistan, US vs China (April-May 2001), Russian vs Estonia (April-May 2007), etc…). These non-governmental national assets are generally used for the traditional purposes of imposing one nation’s will and conditions upon another.

Two and a half years later and we can only allege? That’s the plausible deniability irregular information operators offer.

One of the first targets of enemy Civilian Irregular Information Operators will be friendly Civilian Irregular Information Operators.

What are some of the operational and intelligence lessons that can be drawn from these conclusions? First, for Russia or China to employ their people’s patriotic ‘hacker militia’ to conduct a network attack against a target nation-state, they must engage them first – to motivate and ‘sell’ them on the concept; steer them toward appropriate targets; synchronize those cyberspace operations with combat activity in the physical realm; and discuss the most effective cyberspace tactics, techniques and procedures (TTPs) to be used. The patriotic hackers and cyber militias need to be focused by the aggressor government against the opponent‟s center of gravity and their activities to be synchronized with attacks against that center of gravity from the other domains. These hackers and cyber militias need to understand the opponent‟s center of gravity in order to develop cyberspace domain approaches and techniques to effectively attack it. These preliminary cyberspace activities often create an identifiable signature that can be tracked and monitored in advance of combat operations. Nations need to monitor hacker chat rooms and communications of potential aggressor nations in order to intercept and understand this activity.

How would the United States employ our people’s patriotic ‘hacker militia’?
What arm of the octopus could engage them, motivate and ‘sell’ them on the concept, steer them toward appropriate targets; synchronize those cyberspace operations with combat activity in the physical realm; and discuss the most effective cyberspace tactics, techniques and procedures (TTPs) to be used?

Nobody in our .gov/.mil could overtly engage them without suffering political retribution from Legislative/Executive branch elements that do not want American patriotic hacker militias engaged. That leaves former or retired .gov/.mil beyond the reach of retribution, and contractors that don’t get much political oversight.

Russian-oriented hackers/militia took out news and local government web sites specifically in the areas that the Russian military intended to attack in the ground and air domains. The Federal and local Georgian governments, military, and local news agencies were unable to communicate with Georgian citizens that were directly affected by the fighting. This provided an intelligence indicator of the ground and air attack locations. It created panic and confusion in the local populace, further hindering Georgian military response. This effect also provides a future aggressor nation with an opportunity to conduct military deception operations via feints and ruses to mislead the target nation population, government, and military. A sudden „blackout’ of cyberspace activities in a specific region may provide an indicator of a tactical or operational level conventional attack. Or it could be used as a sophisticated cyberspace operation as part of a larger deception plan, creating a feint in the cyberspace domain to lure opposing forces into believing an attack is imminent in another warfighting domain. Use of patriotic hackers and cyberspace militia themselves might be a deception effort to attract the target nation‟s attention away from the aggressor nation‟s top-quality military and intelligence community cyberspace operators that quietly conduct the main effort in the overall cyberspace domain operation.

Are we even allowed to use MILDEC anymore? Could any U. S. MILDEC’ers work by, with and through American patriotic hackers and cyberspace militia?

In future combat, aggressor nation patriotic hacker militia can be called upon to conduct cyberspace fire & maneuver operations performed directly in support of forces in other domains, They could also be extensively utilized to conduct deception efforts in cyberspace in support of operations in the other domains or to act as a distraction for other cyberspace operations conducted by government professionals against target nation high value targets (HVT).

UPDATE 012911: This Week at War: Lessons from Cyberwar I


Filed under CNA, CND, Info Warriors, IW, PSYOP Auxiliaries

Become A Cyber-Scout, Clean Up Thailand’s Internet! (via Saiyasombut)

H/T: Evgeny Morozov

Originally published at Siam Voices on December 17, 2010 In an everlasting attempt to uphold its image as a fierce defender of the royal institution and thus effectively controlling a national narrative the Thai government now sets its aims into the online world. The ministry of justice, where the Democrat party is in charge, has set up a so-called ‘Cyber Scout’ training programme for next week December 20-21 at Kasetsart University. On their web … Read More

via Saiyasombut

See also Cyber Scout: Thailand’s internet police?

Comments Off on Become A Cyber-Scout, Clean Up Thailand’s Internet! (via Saiyasombut)

Filed under G-2, IW, PSYOP Auxiliaries

Who is th3j35t3r? (via T3h H3r0d07u5 R3p0r7)

Who is th3j35t3r? Report #THR20101217A Release Date: 12.17.2010 Executive Summary The hacktivist who goes by the handle "th3j35t3r" has been carrying out denial of service (DoS) attacks against suspected jihadist websites since he showed up on the hacktavism scene on January 1, 2010. He uses a DoS tool called XerXes that he claims to be the sole author of. He also claims to be "an ex-soldier with a rather famous unit" and to have served two tours of duty as an air … Read More

via T3h H3r0d07u5 R3p0r7

Comments Off on Who is th3j35t3r? (via T3h H3r0d07u5 R3p0r7)

Filed under G-2, Heroes, Info Warriors, PSYOP Auxiliaries

Cyber guerrillas can help US

Evgeny Morozov’s “cyber guerrillas” are referred to as Civilian Irregular Information Operators on this blog, but we are both talking about non-state actors. 

Morozov essentially wants somebody to persuade, change and influence the sophomoric Julian Assange to collaborate with traditional media, redact sensitive files, and offer those in a position to know about potential victims of releases the chance to vet the data and turn Wikileaks into a new Transparency International.

I want him dead.

Morozov thinks that would create a global movement of anti-American politicised geeks clamouring for revenge.


Are there enough pro-American politicised geeks to counter vengeful anti-American politicised geeks?

Are there any U. S. .mil /.gov Information Operators capable of  countering vengeful anti-American politicised geeks working by, with and through pro-American politicised geeks?  No real way of knowing.  Bound to be some who are capable of it, but of those, how many are willing to risk their careers associating with politically incorrect  pro-American politicised geeks?


Filed under CNA, CND, IA, Idea War, IW, Morale Operations, PSYOP Auxiliaries, Resisters

Zachary Chesser, Anwar Al-Awlaki and YouTube: Ah! Symbiosis! (via StarCMC’s Enemedia Roundup)

I am proud of my blogdaughter.

I have been extremely busy with a bunch of personal stuff and haven't had time to write.  I was actually taking a break with a pal last night and missed an interesting – and oh! so sweet! – bit of  news which I would normally have seen at the Jawa Report, but I got on email from a friend late last night.  It seems that RevolutionMuslim's South Park threatener Zachie-boy Chesser,  using his infant son as camouflage (what a typical terrorist thing … Read More

via StarCMC's Enemedia Roundup


Filed under Info Warriors, PSYOP Auxiliaries

Psychological warfare, PSYOPS, its role during war and its current use in America (via A Charging Elephant)

I’m just a self-tutored, undocumented, half-vast amateur PSYOPer on the internet blogging in my pajamas, but I don’t expect to transition into a self-tutored, undocumented, half-vast amateur MISO’er. You might think Regulars in that line of work would choose their terms and acronyms with an eye towards perception management.

MISO horny!


Psychological warfare, PSYOPS, its role during war and its current use in America by Jim Campbell The staple activity of PSYOPS during combat operations is leaflet drops. The military views this as a function of psychological operations, although the tactics are relatively rudimentary and straightforward and not what the general public assumes to be PSYOPS, ala the Manchurian Candidate. Gen. Tommy Franks estimated that 28 million leaflets were dropped over Iraq. Hundreds of different leaflets were used, often custom-tailored a … Read More

via A Charging Elephant


Filed under Info Warriors, PSYOP, PSYOP Auxiliaries

National Defense University Blogging About Civilian Irregular Information Operators

Deterring Chinese Cyber Militias with Freedom Militias

US defenses are insufficient to stop Chinese cyber attacks. The US-China Economic and Security Review Commission estimates that Chinese cyber attacks cost the US hundreds of billions of dollars annually. By way of comparison, this is substantially more than the entire Chinese military budget.
What is needed is a threat that is both capable of forcing China to take notice and that it will believe the United States would execute. Such a threat exists. While China’s regime does not appear willing to be deterred by conventional diplomatic or legal complaints, it has demonstrated considerable concern about threats to its censorship apparatus.
The most effective way to threaten Chinese censorship would be for US and partner nations to develop their own cyber militias. Rather than stealing intellectual property and disabling public institutions, however, Western militias would aim at finding ways to bypass Chinese firewalls to spread internet freedom.

There already are American cyber militias. Pretty much the entire Psychological Operation effort intended for the American domestic target audience is entrusted to them. American cyber militia Computer Network Exploitation is a specialty of Internet Anthropologist Think Tank.

The Jawa Report are outstanding American cyber militia Computer Network Attackers and counterpropagandists, specializing in monitoring and taking down Jihadi websites.

Most of the conservative and libertarian blogosphere would love to be involved in disseminating information that annoys the Chicoms and spreads internet freedom behind the Great Firewall. But who amongst the .gov/.mil Regulars dares to work by, with and through Irregular Information Operators in the current political environment?

Also at

Countering the Cyber Jihad, 2006/04/28

Geek Battalion, 2006/05/01

Virtual Cyber Militias Must Run with the Ball OGAs Dropped, 2007/09/15

The Unorganized Cyber Militia of the United States, 2007/09/26

Wedges and Mauls, 2007/09/30

Irregular Restrictive Measures — Blogospheric Computer Network Attack, 2007/10/11

Plausibly Deniable Cat Herders, 2007/10/19

People’s Information Support Team, 2008/02/24

Fuzzy Bunny Slippers IO — The Rise of Pajamahadeen, Virtual Militias, and Irregular Information Operators, 2008/05/22

Red Chinese Cyber-Militia, 2008/05/29

Civilian Irregular Auxiliary Counterprogandists Contributed To Victory, 2008/11/22

Public Affairs and Information Operations, 2008/12/31

eResistance in Moldova, 2009/04/07

The amateurization of cyberwarfare, 2009/08/09


Filed under CNA, CND, IA, Info Warriors, Pamphleteers, PSYOP Auxiliaries

It’s time to sue Google

Why, Google Without Terrorist Propaganda is Like Whip Cream Without the Cherry!

Google: helping make terrorist dreams come true

How many Jihadi videos did Hasan watch on YouTube?

Self-radicalization without Jihadi videos is like self-gratification without porn. Pictures get you there quicker.

UPDATE:  200911271035  The next time the Taliban kill an American, thank Google’s YouTube service for helping spread their vile propaganda.

Countering enemy propaganda is a mission self-mobilized Civilian Irregular Counter-Insurgent Supportive Information Operators can do.

Why does Google get away with it?

UPDATE: 200912311016 Dawn Patrol-alanche! Welcome, Dawn Patrollers.


Filed under Lawfare, Morale Operations, PSYOP, PSYOP Auxiliaries

Political Computer Network Attack/Restrictive Measures

If participating in Distributed Denial of Service (DDOS) attacks on the regime sounds like fun to you, read Spam offers to let people use their PC to attack Obama site and And Now Hackers are DDoSing Obama – Or are they Just Zombifying Your Machine?

Civilian Irregular Information Operators are on both sides of the Idea War.  The demographic stereotypically associated with hackers would generally trend towards supporting the regime.  How did Axelrod get your email address? 

Don’t be surprised some fine morning when you go to check out your favorite blogs and find a bunch of them down.  That would be the regime’s Supportive  Civilian Irregular Information Operators implementing Restrictive Measures against what they see as the propaganda of Opposition Civilian Irregular Information Operators.  Of course, Robert Gibbs will plausibly deny any Administration involvement.

H/T: Daily Uprising


Filed under CNA, Idea War, PSYOP, PSYOP Auxiliaries, Resisters

Civilian Irregular Combat Camera

Think of the Iranians who captured the death of Neda Agha-Soltan and posted it to Youtube in those terms.

Those images persuaded, changed and influenced more people more rapidly than all the Iranian, American, or any other government Psychological Operations/Strategic Communications/Public Diplomacy efforts put together.

Volunteer, unpaid, informally trained or untrained,  uncredentialed, equipped at their own expense with privately-owned Commercial Off The Shelf (COTS) gear acting as Combat Camera on the scene as events occurred provided visual information documentation (VIDOC) of the regime’s repression of dissent.

This is Glenn Reynold’s Army of Davids in action. Distributed Information Operations by Iranian Strategic Citizens.

There are lessons to be learned from Iran for those who seek to prepare themselves.

[Note to self:  learn how to use your damn HTC FuzeTM, dummy! I can use the camera to send a Multimedia Message, if I can figure it out]

UPDATE 20100330

1 Comment

Filed under PSYOP Auxiliaries, Resisters

Militia troops understand that, while our actions cannot stop illegal activities along the border, we can change world perception and national thought concerning homeland and border security.

Roger’s Rangers had rules, and so does the Cochise County Militia.

Their efforts to change world perception and national thought make them Civilian Irregular Information Operators.

1 Comment

Filed under IW, PSYOP Auxiliaries, Scouts

Israeli Civilian Irregular Information Defense Group

Israel recruits ‘army of bloggers’ to combat anti-Zionist Web sites

By Cnaan Liphshiz

The Immigrant Absorption Ministry announced on Sunday it was setting up an “army of bloggers,” to be made up of Israelis who speak a second language, to represent Israel in “anti-Zionist blogs” in English, French, Spanish and German.

The program’s first volunteer was Sandrine Pitousi, 31, from Kfar Maimon, situated five kilometers from Gaza. “I heard about the project over the radio and decided to join because I’m living in the middle of the conflict,” she said.

Before hanging up the phone prematurely following a Color Red rocket alert, Pitousi, who immigrated to Israel from France in 1993, said she had some experience with public relations from managing a production company.

“During the war, we looked for a way to contribute to the effort,” the ministry’s director general, Erez Halfon, told Haaretz. “We turned to this enormous reservoir of more than a million people with a second mother tongue.” Other languages in which bloggers are sought include Russian and Portuguese.

Halfon said volunteers who send the Absorption Ministry their contact details by e-mail, at, will be registered according to language, and then passed on to the Foreign Ministry’s media department, whose personnel will direct the volunteers to Web sites deemed “problematic.”

Within 30 minutes of announcing the program, which was approved by the Foreign Ministry on Sunday, five volunteers were already in touch, Halfon said.

Sounds like New Media engagement by Civilian Irregular Public Diplomacy Auxiliaries. I’d love to see the Foreign Ministry’s list of ‘problematic’ English-language Web sites.  The Bush Administration could have done something almost exactly like this, could have rounded up an Army of Counter Insurgent Supportive Bloggers to represent the pro-victory side on anti-war blogs, could have pushed back.

Hook this Army of Bloggers up to GIYUS and Megaphone and let the CYOP begin.

UPDATE 200901200010:  Latest hasbara weapon: ‘Army of bloggers’

Comments Off on Israeli Civilian Irregular Information Defense Group

Filed under PSYOP Auxiliaries

Foreign Civilian Irregular Information Operations

Irregulars can mix PSYOP propaganda/counterpropaganda with CNA (Computer Network Attack) botnets to hit enemy web sites with DDOS attacks, thus applying Restrictive Measures to sources of enemy propaganda.  A certain amount of PSYOP expertise is required to influence Supporters to volunteer for the CNA botnet, which will be used for PSYOP.  Civilian Irregular PSYOP’ers and Civilian Irregular hackers can work together nicely.


Citizen Propaganda in Contemporary Conflicts: The Case of Israel-Gaza, Russia-Georgia and China-Tibet

Install a trojan for Israel? Uh, no thanks.

Hacktivist tool targets Hamas

Wage Cyberwar Against Hamas, Surrender Your PC

Hackers Take the Fight Over Gaza Online

Help Us Win

UPDATE 200901121951: Israel’s Looking for a Few Good Cybermen

Help Israel Win

UPDATE 200901141557:  Technology Delivers War Propaganda to Gaza, Israeli Citizens

UPDATE 200901141643:   Gaza crisis spills onto the web

Comments Off on Foreign Civilian Irregular Information Operations

Filed under CNA, Info Warriors, PSYOP, PSYOP Auxiliaries

School of the Counterpropagandist Revisited

Recent discussions elsewhere on counterpropaganda responsibilities reminds me that newcomers to this blog may not have seen our School of the Counterpropagandist series. 

School of the Counterpropagandist

School of the Counterpropagandist — Terminology

Lesson No. 3 in the School of the Counterprogandist

School of the Counterpropagandist — Opposing Information

School of the Counterpropagandist — Propaganda

Irregular Restrictive Measures — Blogospheric Computer Network Attack

SotC — Disinformation Practical Exercise

Counterpropaganda Techniques

School of the Counterpropagandist — What Is Propaganda?

This was my version of Distance Learning for Civilian Irregular PSYOP Auxiliary Counterpropagandists.


Comments Off on School of the Counterpropagandist Revisited

Filed under PSYOP Auxiliaries

Al Qaeda Terrorist Forum Admits Defeat Against Operation YouTube Smackdown

FR thread here.  Freeper jveritas is Joseph Shahda, one of the early Civilian Irregular Information Operator counterpropagandists that inspired this blog. StarCMC, you have done well, blogdaughter. Congratulations, Smackdowners!


Filed under Heroes, Info Warriors, PSYOP Auxiliaries

Civilian Irregular Auxiliary Counterprogandists Contributed To Victory


Victory, they say, has many fathers and defeat is an orphan. Some of us refused to abandon it.

We kept the faith with our nation’s warriors. We knew deep down that what we were being told was not the whole story. And we believed that our nation was a force for good in this world, and that the soldiers, sailors, airmen and Marines sent forth to break militant Islamicists of their homocidal habits were the best human beings this Republic had to offer. Zombie Time has put up a huge list of virtual minutemen. This victory is for them, too:

Here is the official list of blogs that have so far agreed to mark VI Day on November 22, 2008:

Victory in Iraq Day: Participating Blogs

Gateway Pundit


Little Green Footballs



Because No One Asked

Dog Opus Blog

Oh No, Another Conservative Blog

Who Is John Galt?

Gathering of Eagles (national)

Gathering of Eagles New York

Gathering of Eagles North Carolina

Stop the ACLU

The Surfing Conservative

Civilian Irregular Information Defense Group

The Wide Awake Cafe

The Foxhole

Lighthouse on the Right

Arming Liberty

Uncle Sam Ate My Baby

Down Is Up

Foreign and Domestic

WOT Daily

The Blog of Record

Serr8d’s Cutting Edge

Army Wife: Rants from Ft. Livingroom

Hamilton, Madison, and Jay

Rochester Conservative

The Daily Blogster

I Call BS!

Macker’s World

Something should go here, maybe later

Nice Deb

The Bronze Blog


The Irascible Chef

Sharp Right Turn


Tman In Tennessee

Thunder Pig

Sith by Sithwest



Marooned in Marin

Thoughts Enroute

More Weight


The Jack Knows

Red State Rumblings

High Plains Blogger

Air Force Pundit

Fallback LGF

Liberty for USA

Diary of a Madman

The Rumbler Report

D.C. Thornton

Lock and Load

Fat Angie


Oedipal Beatdown

Conservative Action Network

A Herd of Turtles

Penny’s Potpurri

Sayyad al Wahabiyya

Brain-Surgery With Spoons

American Syndicalist Party


Public Secrets


Toxic Taxation

Berman Post


The Inquisition

Pax Parabellum

CrossFit Camp Pendleton

Freedom Watch

American Truths

Destination OBX

Fearless Dream

Theodore’s World

The Cool Blue Blog

Life With Monkeys

Woody’s Place

Wild Weazel

The Atheist Conservative

King’s Right Site

We are the Grizzwolds




Confederate Yankee

The Jawa Report

Ed Driscoll

Facebook group for Victory in Iraq Day

Barking Moonbat Early Warning System

Exurban League

Noblesse Oblige

Protein Wisdom Pub

Black & Right

Johnson County Republican Party

Winefred’s Well

Still Unbounded

The Liberty Boys

Atlanta ROFTers

This is Scooter Country

The Crescent Moon

From My Position…On the Way!

Letters to a Dying Dream

Blogs for Victory




Conservative Diggs


Erica Marceau

Pirate’s Cove

Let’s Get It Right

Cmblake6’s Weblog

What Bubba Knows



Psycmeister’s Ice Palace!

Stable of Zionist Hore #2

Conservative in Seattle

Karridine Delivers



Zim’s View

I Am, Therefore I Think

Patriot Missive

USS Neverdock

Dan Cirucci

The Conservative Contessa

The Four Rs

Wake up America

The C-Square

Sarge Charlie

Red-Hot Right

Echoes in Eternity

American Infidel


supporting the troops

One Model Place

The Dumber Ox

The Lightning News


2nd Exposure


Lindy’s Blog: Where Mom is Always Right

Comics Pundit

No Clever Pseudonym

Free Frank Warner

The Digital Hairshirt

The Blue Pelican


Nothing But the Facts


Environmental Republican

Irons in the Fire

no blood for sauerkraut!

The Individualizer


Nebulous Continuum

Take Our Country Back

The Conservative Radical

Zion Beckons


Soldiers’ Angels Germany

Paul Ibrahim

jweaks on Squidoo

Marie’s Two Cents

The Other Club

The Anchoress

Beyond the Veil

Michigan Taxes Too Much

Once More Into the Breach



These bloggers, listed here as supporters of the idea of celebrating VI Day today, along with the bloggers listed along the left side of this page who may not be so certain that today is the best day to do this, served honorably as People’s Information Suport Team members, Virtual Cyber Militiamen (and women!) and nodes in the Blogospheric Resistance.

We would not let America quit on our warriors.

Ave, Triarii.



Filed under Heroes, Info Warriors, PSYOP Auxiliaries

Years From Now, Students of Counterpropaganda Will Be Studying This

Civilian irregular information operators strike again.
Hope, Change, & Lies: Orchestrated “Grassroots” Smear Campaigns & the People that Run Them
Did Obama Fund Web-based Smear Campaign Targeting Palin?
Bloggers sniff out anti-Palin astroturf campaign– and the cover up begins
The Jawa Report on the Biggest Winner Loser in the Blogosphere
“eswinner’s” YouTube Account Officially Closed 15 Minutes Ago;
No Defamation Without Representation!

This has the potential to eclipse the scalp of Dan Rather on the lodgepole of the anti-left blogosphere.
Blog War Veterans For The Truth to the rescue!

UPDATE: “Viral attacks are where it’s at in 2008.” — Kossack Geekesque, via Clobbergirl, by way of Ace. Internet Political warfare/IO/PSYOP/propaganda/counterpropaganda breaking so fast and furious it’ll take days to read all the bloggage on this. The Anti-Left blogosphere is studying the enemy’s tactics, adopting some and improving upon them. Wish Anti-Left Talk Radio would chime in.


Filed under Cyber Guerrilla Chieftains, Idea War, Info Warriors, PSYOP Auxiliaries