Cybersecurity Experts: Stop Sending Troops Into Combat With Personal Tablets, Smartphones In the 21st Century, lessons like this are not just for the Military, but for the Civilian Operator as well. As long as we are dependent on tech, exploitation will always be there. Stay Alert, Stay Armed and Stay Dangerous!
Category: Hybrid Warfare
CO 101: Battlefield Intelligence
BATTLEFIELD INTELLIGENCE: A PRIMER ON COLLECTION & EXPLOITATION Extremely valuable primer on collecting intel in the field. Stay Alert, Stay Armed and Stay Dangerous!
A Well Funded Invasion
VIDEO: Someone is Handing Out Stacks of Cash to the Migrants Headed to U.S. The Immigration Crisis in this country has been at a CRITICAL STAGE for months now but you would never know it because the powers that be in the D.C. swamp and their media press-titutes have been distracting you with political soap…
Dose of Truth: The “Future” of War is Now
If any of you have ever read the book Ghost Fleet by P.W. Singer you would realize with a chill down your spine that more and more things listed in that fictional work regarding Military Technology is beginning to unfold right before our eyes. The recent unveiling of China’s new Dark Sword Drone makes the…
China on the Border
CHINESE PURCHASE LARGE MEXICAN RADIO STATION NEAR US BORDER Fourth Generation Warfare continues to be waged by China, this time via radio waves. China has perfected the art of Lawfare, Information Warfare, Cyber-Warfare, Cyber Theft, Economic Terrorism Propaganda and good ole’ fashioned espionage down to a science. Just ask Diane Feinstein about it. This…
Thought Crime at an All Time High!
ON THE HEELS OF THE INFOWARS BANNING, TWITTER BANS THREE PROMINENT LIBERTARIAN ACCOUNTS I don’t know about you folks, but When things like this happen it only strengthens my resolve to be more independent and self-sustaining. I strongly encourage all of you to take the authors advice and seek training not only in communications,…
Guerilla Warfare History: 32 Battalion Operations in the South African Border War
32 Battalion Operations in the South African Border War For the Military Historian and Civilian Operator alike, the study of the African Bush Wars are excellent primers on Guerilla Warfare. Stay Alert, Armed and Dangerous!
Cyber-Warfare for Sale
Hackers claim to auction NSA source code (click above title link to be re-directed to Source page) More shenanigans from State Sponsored hacking groups most likely. Just another reminder that we have not yet begun to see the true capabilities of what warfare in the fifth domain entails. Stay Alert, Stay Armed and Stay Dangerous!
Espionage Files: How Putin Weaponized Wiki-Leaks
Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election. Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands…
Civilian Operator 101: Hybrid Warfare Historical Study
Russia’s actions in the Ukraine has brought new attention to the concept of “hybrid warfare”. The uptick of interest has been spurred by the waging of hostilities on multiple levels and specifically the seeming novelty of using irregular, political, and information operations in conjunction with more traditional coercion. Such tactics are meant to identify, exacerbate,…