Sunday, March 31, 2013

British Resistance Model


"In July 1940 Gubbins recruited about a dozen regional Captains as Intelligence Officers who would form the backbone of the newly created Auxiliary Units. Their mission was to find 30 or so reliable men and issue them with an assortment of explosives, weapons and vital supplies. These men became known as ‘dump owners’. The IO’s were to help the ‘dump owners’ to form cells of 5 or 6 men, to train them in the use of weapons and to provide the cells with some form of hideout."

A good bit of history regarding the British Resistance program and SOE, sent in by a reader. What is interesting to note is that this is one of the few times a resistance group was stood up before it was actually needed. They of course, where never utilized; being as the Germans never took over the British  isles.
 Food for thought - prior to homefront hostilities, they had a basic TO&E in place, training programs, safe houses and caches........

Read it all HERE


(Thanks to R.B. for the link)

(TO&E - Table of Organization and Equipment)



Saturday, March 23, 2013

Upcoming New Courses

You asked for it - so here it is....

We will be putting on a new course 10-12 May and possibly on 24-26 May. This course will be the Kidnap Defense/E&E merged with the communication and encryption techniques described in my  Unexpected Warfighter series ( Part 1Part 2Part 3 ).

Upon successful completion of this course you will have learned and demonstrated the techniques described in the series, as well as escaping from criminal custody, planning a safe route through a hostile urban setting, vanishing into a crowd, avoiding refugee lines of drift and many other life saving techniques. This course is a must for the business traveler, tourist or anyone working or living in a hazardous or unstable area.



Training will be held in the Pacific Northwest. Cost is discounted to $500 and, dependent on venue, we will offer a carbine and pistol skills workshop the day prior to the course for those that are interested. We will run you through several evaluation drills utilized by the special operations community and help you with your marksmanship and manipulation skills as needed - at no cost to attendees.

Please RSVP as soon as possible so we can keep the class size at a manageable level. You can find further details on the Courses page, or email me with any questions. This is the most popular course I teach and am only able to offer it once or twice a year - so don't miss out on this crucial skill-set.



Monday, March 18, 2013

Rainy, muddy range day...


Today's drills: Pistol Retro

IPSC Target
Time: One minute
Total rounds: Nine

Stage One -

From concealment, starting from target,

Run to 10 yard line, draw-turn, shoot two to A zone (chest), one to A zone (head)

Run (at high port) to 25 yard line, turn, shoot two (chest)

Run (at high port) to 50 yard line, turn, shoot two (chest)

Run (at high port) to 100 yard line, turn, shoot two (chest)

Score with normal IPSC scoring - 40 points is a pass

Stage Two -

Same thing, except - stage your magazines so that you have to do a stress/combat reload as you run from 25 to 50 and another from 50 to 100.
....................................

Next, carbine from 50 yards,

IPSC Target
No Time
Total rounds: 12


From low or high ready,

Two rounds standing

Two rounds squatting

Two rounds urban prone

Two rounds supine fire

Two rounds kneeling

Two rounds brokeback

Score with normal IPSC scoring - 56 to pass
.........................................

The first drill works on your break-contact skills and the second on unconventional/uncomfortable shooting positions. Enjoy....





Kizeme, perhaps?


As the infantry saying goes......the diversion to your rear that you are ignoring - is actually the main attack...

Read the skinny HERE

Whether a feint or simply a strategy of using multiple fronts - it's not good. 

(h/t to Freedom Outpost)




Saturday, March 16, 2013

One step at a time John...


John stood uncomfortably against the bathroom wall, trying not to be conspicuous. The gentleman that had been using the urinal finally finished his business and stepped towards the sink. John moved forward to take his turn. He glanced down and spied the round little urinal cake that had about a quarter of it's circumference sliced off, creating a flat edge. John, recognizing the long awaited signal, glanced to his side as the only other occupant departed the restaurant bathroom letting the door slam behind him. John quickly fished the little zip-lock bag out of his pocket and, choking back his disgust, scooped up the all important little cake, sealing it up and stowing it in his pocket just as another patron entered the restroom. 

His trip home was uneventful. He had even done a couple SDR's (Surveillance Detection Route) on the way back, just as he had been instructed to do. Satisfied that no one was following, he continued on to his apartment. Even though he had been a soldier not all that long ago, this was unlike anything he had done while in the Army. 
He stepped into the closet of his small bedroom closing the door behind him. He felt silly sitting in the tiny windowless room, but his sponsor had insisted on this particular protocol. He broke open the pungent urinal cake releasing the small usb drive inside. Once he logged into his encrypted system, he plugged in the drive opening the encrypted partition inside. He decrypted his instructions and deleted the file after which he pushed the usb drive inside the tennis ball he had prepared just for this special task. He shoved the ball into the pocket of his fleece jacket and headed towards the city dog park. 
A block behind John, the passenger door of a tan SUV swung open depositing a middle aged man in a jogging suit onto the sidewalk. He spoke quietly into his hidden microphone, asking for a comms check as he set out in a surreptitious pursuit. 

John scanned the scene as he walked into the park, trying his best to look nonchalant. He struggled to keep his paranoia in check as he walked past an old man playing a game of chess with what John assumed was his grandson. He approached the dog area and headed for a bench that was partially obscured in the trees. He pulled off his jacket as he sat down, laying it next to him. He scanned the scene again – the two men playing chess had departed, several children played on the nearby jungle-gym, a half dozen people were walking or playing with their dogs directly across from him....and now...now...he waited. John glanced to his left inexplicably and caught the gaze of a jogger stretching against the fence near the entrance, the jogger's head snapped away suddenly and John simultaneously felt a chill crawl over him and a heaviness hit his gut. Was this more paranoia? Something felt very wrong and John suddenly wanted nothing more than to be away from this place. He kept his head straight but watched the jogger with his eyes. He could see the jogger's mouth moving as if he was speaking, but there was no one visible in his vicinity. John's mind raced – he was being watched, and he had to assume that the regime's thugs were about to descend on him and drag him off on what was typically a one way trip. John took a deep breath and tried to focus on the E&E plan that had been drilled into him. Step one: Create distance and establish baseline.....

Despite every part of his being telling him to sprint like a madman, he calmly stood and walked away from the jogger/spy towards a cafe on the opposite side of the park. He had actually rehearsed this very escape plan not even a month ago, but still had serious reservations about it actually working. If he could just make it into the cafe bathroom, he could slip out the small window into the alley, and if lucky, get to his emergency cache site putting some distance between himself and his pursuers. John didn't even breathe as he crossed the street.....waiting to feel the agent's hands grab him from behind, but no one grabbed him. He latched the bathroom door shut and breathed a sigh of relief. This could actually work! He allowed himself to think as he pulled his reversible shirt back on and reached for the window........

Back at the park – a little old lady watched agents swarm into the park and descend on the jacket the young man had left behind. They tore open the pockets, shaking the jacket and gestating wildly in what she knew was frustration. She just smiled and tossed the fuzzy green ball back across the grass with Brisco in happy pursuit.





Friday, March 15, 2013

LEO Follies...

I remember a kids magazine we had when I was growing up that featured a game which presented the reader with a picture of some common, everyday event - the challenge was to find the things in the picture that didn't belong....


Did you spot it? Kinda jumps out....
( This one is courtesy of TSP - His post can be found HERE ......pretty funny)

Here it is again, in case you missed it....

Here's a couple more to really get your day off to good start...




And it wouldn't be complete without everyone's favorite DEA gun-ninja putting a round through his foot in a crowded elementary school classroom....


.........................................................................................
This could go on ad infinitum, so I will stop it here.

Just remember folks - only government employees are highly trained and professional enough to be trusted with firearms.





Wednesday, March 13, 2013

Eva's tech


Let's examine some of the equipment and techniques utilized by Eva. Readers will note that the particular unit in this story opted for physical couriers as opposed to electronic transmission (email, chat, phone, radio). While there are certainly methods available for secure transmissions (which we will get to eventually), one must approach the subject from the standpoint of "no such thing as unbreakable security". That being said, you should not allow your operational ability to become crippled due to the paralysis of paranoia. You give due diligence to securing with the best techniques and technology available, and exercise disciplined protocols such as frequent password and key changes, integrity testing and periodic false information seeding.

As to Eva's gear....
She was booting her system with a thumb-drive/usb drive with Liberte linux ( HERE ) installed on it. This allows her to complete her work without creating a data liability in the form of forensic footprints should her laptop be searched at some future date.

You could choose a usb drive for durability, like the Lacie extreme drive above, or one that disguises easily, of which there are many. The benefits of the extreme drive, which can withstand deep water submersion, drops, bumps and even being run over by a truck; make it a suitable choice for caches or go-bags and give the user an otherwise unavailable communication media in a crisis situation.
  
 Once her system is up and running, she inserts the microSD card into the laptop.
She could use the laptop's built in card reader, or an add-on reader if the computer lacks one.
Once her system mounts the microSD she opens the encrypted volume (using the courier level pass-phrase) and adds in her own report. This gives the end user a sort of chain of custody as well as a SALUTE report for Eva's area of operations. The data that is contained inside the encrypted volume is also encrypted so that we have many levels of encryption protecting the data. Eva encrypts her report with the end user's monthly PGP "public key" (meaning only he can open it) and then signs it with her key (to ensure it is authentic and was not tampered with in transit). 
Note that while they are using a difficult to destroy usb drive for their operating system (in this case, Liberte) they chose an easily destroyed microsd for the actual data. There are many programs out there for securely deleting data, but the only sure way in an emergency is to physically destroy the medium - in this case, crush and grind. 

(Encrypted volumes can be setup with THIS, or THIS)

One could opt for a simpler method for passing short messages, but the above method is a crucial tool when moving large data files such as maps, pictures, video files, etc, that an operational unit is going to need on a regular basis.

Again, I would state that this is not a panacea for perfect secrecy, but can be a valuable tool when used in a judicious and disciplined manner. 

Let's also take a quick look at Eva's courier report:
...............................................
DTG (Date time group of report)

S=8 (indicates a Size of 8 personnel)

A=TCP / STOPPING, SEARCHING ALL P & V (indicates an Activity of traffic control point/check point)

L=27th+Broadway (in this case it was Located at the intersection of~)

U=RSF (whatever unit/department/agency involved)

T=16320116 (DTG when activity was observed)

E= MRAPx2, MGx2, SEDANx1, M4x8, GLOCKx8, K9x1, GARRET WANDSx2, BAGGAGE XRAYx1, IED RESIDUE TEST EQUIPx1, RADIOx3 (this would list the observed equipment in use)
....................................................

It's important to note that Eva does not speculate, but only reports what she actually sees. It is a safe guess that there are mounted radios and extra weapons in the vehicles, but the Intel officer reading the report will choose to make that assumption or not.

More to follow...




Tuesday, March 12, 2013

Posterity


"Let us contemplate our forefathers, and posterity, and resolve to maintain the rights bequeathed to us from the former, for the sake of the latter. The necessity of the times, more than ever, calls for our utmost circumspection, deliberation, fortitude and perseverance. Let us remember that ―if we suffer tamely a lawless attack upon our liberty, we encourage it, and involve others in our doom, it is a very serious consideration ...that millions yet unborn may be the miserable sharers of the event."
-- Samuel Adams



Sunday, March 10, 2013

The Unexpected Warfighter



Brisco strained against his leather collar, seemingly eager to leave the immediate area. Eva's 70 year old fingers snapped back on the disgruntled terrier's leash, but she could certainly understand his unease. Even though the neighborhood “safety checkpoints” had been a part of their daily life for the better part of the year, she never could resolve herself to see them as anything other than a 21st century re-envisioning of cold war east Germany. The pat downs, the scanning and downloading of her cell phone, the x-ray and search of her belongings just to get from one part of town to the other. Of course it was all necessary because of all the “terrorist activity” in the area; or so she was told.

Once inside her apartment, she began what had become a twice a week operation...removing Brisco's ornate leather collar...pulling back the stitching....retrieving the microSD card hidden between the leather laminate and beneath one of the several steel sequins that decorated his collar. She noted the small red sticker attached to the tiny device, indicating that it was a time sensitive message and needed to be passed as soon as possible. She plugged her “special” thumb-drive into her old laptop and turned it on. The system recognized the bootable operating system on the thumb drive and the hardened OS came to life. She entered her passwords and inserted the microSD card. She opened the Truecrypt volume that resided on the micro and observed one file entitled “r6K?q@71”, this meant nothing to her, not that it should have.....while she and several other groups had the monthly passphrase to open the disk itself, the file inside could only be opened by the intended recipient. She typed up her short courier report, which was basically her version of a succinct SALUTE report for the last few days, encrypted it with her PGP key and inserted it into the Truecrypt volume of the micro. She returned the micro to it's furry courier and pulled the thumb-drive from the laptop, causing the computer to scrub it's memory before shutting down.

Eva gathered her things, and with Brisco in tow, headed towards the door, pausing for a moment to look at a picture on the wall. She needed courage right now and looking at the white haired man in the picture that she had shared her life with..... until agents of the regime took him away forever ….refueled her cause and steadied her nerves. Brisco broke her from her thoughts with a muffled woof,  as if reminding her of the time sensitive nature of their mission.
As she and her cohort headed to their dog park rendezvous, she let a half smile show.....lives depended on her, she mattered! – perhaps now more than ever...


This serves as an example for the ongoing COMSEC series. More to follow.......




Wednesday, March 6, 2013

COMSEC and Privacy


Communications Security is, and must be, a primary concern to any warfighter. When I was still in uniform, a great deal of our target packages were generated or acted on due to some schmuck out there turning on his cell phone and making a quick call - falsely believing his brevity would spare him any unpleasantries. The content of that call was not necessarily of import to us, but rather the fact that we knew who owned that particular phone (via ESN and IMEI) and had the ability to geo-locate it right away.  Now we knew that we had "High Value Target # whatever" at such & such grid and could hastily act on that fresh intel.

Much of warfare is based on first prepping the battlespace (civil affairs, psyops, humint, elint, etc), and then exploiting your enemy's mistakes. In this case, we had a technological advantage over the enemy and would exploit it on a regular basis. Now, one has to imagine that after many years of conflict the insurgents would be very much aware of this electronic disparity and would avoid employing said items. From my perspective, some of the groups would in fact employ some self discipline and avoid the gadgets - effectively "low-teching" us, consequently robbing us of that targeting asset. Instead they would rely on old school techniques such as couriers, dead drops and encryption like "one time pads".

One has to wonder why they did not use faux comsec violations as bait for an ambush more often. For example - activating a known high profile bad guy's phone as a bit of poison fruit to draw a raiding party into a kill zone. Makes for a bad day... 

The point of this article is to bring attention to the inherent dangers/privacy issues of our various communication media. Radio can be eavesdropped on and DF'd (direction finding). Same issue with cell phones, as pointed out above. Email is collected and stored by various state and non-state entities.
So, how can this threat to privacy be mitigated in a effective, real world way?

Step One: Go HERE and read. Understand. This is the foundation of what will follow.

More to come.....



Tuesday, March 5, 2013

Life as a tyrant


Excerpt from My Life As A Tyrant....

"The operation began. Dozens of officers entered the bazaar, followed by NATO soldiers and their cargo truck. The vendors initially didn’t know what was happening. Then cops walked up to stalls and asked for permits. Nobody had them. The cops grabbed everything they had and threw it into the back of the truck.

Hundreds of vendors picked up their wares and ran. The slow ones were accosted and stripped of their possessions. KPS officers swarmed me, saying, “We can’t do this! This is what the Serbs used to do!” I stood back, watching the chaos in angry silence, and said something in Albanian. It was a phrase I never in my life expected to say.

“Ne jeme komunista sot.” We are communists today."



Read the rest of this article HERE


(h/t to chrishernandezauthor)


Sunday, March 3, 2013

Blueprint for dismantling a free and prosperous society




Let's see...

An opposition backed by Marxist thinktanks and governments – check

Prosperous economy buckles under strain of entitlement class – check 

Enforcers/troops (the “good guys”) arrive for “the safety of everyone” - check

Media reports one narrative, enforcers pursue another – check

Politicians make empty promises and issue outright lies – check

Checkpoints and curfews are established for “the safety of everyone” - check

Resistors and patriots are demonized by the media and central government – check

Stockpiling of ammunition and arms by the “good guys” – check

Citizens are told repeatedly to not worry about the nonstop build up of troops, arms, ammunition and checkpoints – check

Psychological operations undertaken designed to pit one social group against another – check


........................................

This is not the plot to an upcoming Prepper/survival novel, but a very real and unfortunate chapter from our history. The video is about an hour long, but I encourage you to watch it all and see if you can identify the numerous correlations with the present.

Watch it HERE



“....In a world of anti-individualism, we have asserted our belief in the fundamental dignity of  individual man and his right of life, liberty and the pursuit of happiness...”
– Moise Tshombe


This is the same conflict where Che Guevera (under Castro's direction) tried to expand his sphere of influence into Africa and was soundly trounced by Col. “Mad Mike” Hoare's 5 Commando.

Mike Hoare on the right discussing liberation of Stanleyville.

Hoare's right hand man, Alistair Wicks (right).




Saturday, March 2, 2013

Glock production


Just to add to the current craziness - 

Have it on good authority that Glock's factories are backlogged by 1.2 million pistols - which translates to about a year's worth of production.

Hope you got yours already...


Friday, March 1, 2013

Quote for today...


"We are fast approaching the stage of the ultimate inversion: the stage where the government is free to do anything it pleases, while the citizens may act only by permission; which is the stage of the darkest periods of human history, the stage of rule by brute force."
-- Ayn Rand


.....clearly she was just paranoid...