How Siege Warfare Returned The history of war is never far removed from battles for cities. Many of us, of whatever creed, were brought up on the story of the walls of Jericho tumbling after the Israelites marched around the stronghold once a day for six days, seven times on the seventh day, and…
Category: Fourth Gen Warfare
Clay Martin: Cyber Wolves
A Case for Applied Bitterness
Via: Kensho Homestead The Promise and The Fantasy: It is said Love is God’s weapon. Revelation 21: 1-6 “Then I saw a new heaven and a new earth, for the first heaven and the first earth had passed away, and there was no longer any sea. I saw the Holy city,…
Small Unit Tactics: Building a Fighting Position (Revised)
For the individual soldier, being able to build either a hasty or prepared position to fight from that will give you adequate cover and at the same time good fields of fire is essential for small units to be efficient in the field. All of the material I am covering here can be found…
Fast and Furious: The Philosophy and Mechanics of the Blitzkrieg Tactic
Fast and Furious: The Philosophy and Mechanics of the Blitzkrieg Tactic It’s the dawn of World War II, and the old ways of fighting aren’t cutting it anymore. Soldiers huddled in trenches, days turning into weeks with little progress—it’s a stalemate that no one wants to repeat. Enter the Blitzkrieg tactic, a plan that’s…
Myanmar Guerillas Using Homemade Weaponry
H/T Impro Guns Another video of PDF fighters taking shots at Junta forces from an entrenched position. Pictures and videos have previously surfaced of bolt action .223 rifles which appear to be the same featured. At least one appears to be a bolt action 12 gauge shotgun. Guerilla forces have also been known to…
Comm Corner: Encrypted Radio Comms Compromised
H/T WRSA An Intentional Backdoor discovered in Encrypted Radio Comms used Globally for over 25 years. Via Source Article from WIRED. This backdoor could allow someone to snoop on communications and potentially send harmful commands. The researchers also found a second vulnerability that could let someone decrypt encrypted voice and data communications…
The Sniper Big Four
The Sniper Big Four This is from the former Patrol Base blog. Highly recommend you bookmark.
Guerilla Tactics Flashback: 2002 D.C. Snipers and 2015 Dallas Police Attack
Guerilla Tactics Flashback: 2002 D.C. Snipers and 2015 Dallas Police Attack Don Shift’s recent article on Gun Trucks got my mind turning on Guerilla Vehicle Tactics. The attack on Dallas PD June 13, 2015 by a man in an armored van represents a variation on a tactic that has not been seen since…
The Surveillance State: Israeli Unit 8200-Created Spyware Firms Assisting Mexican Cartels
Israeli Unit 8200-Created Spyware Firms Assisting Mexican Cartels In 2023 alone, eight journalists have been killed due to being tracked down using NSO Group’s software. When Sinaloa cartel leader, Joaquin Guzman-Loera, also known as El Chapo, was on trial, one of his engineers stated, “I bought interception equipment that allows access to phone calls,…