Friday, November 15, 2013

December Training Dates

I am going to go ahead and open up December 6-8 for classes in the NW. I have had requests for T3C/Off-Grid Medicine, Combat Pistol, SUT and E&E. I won't be able to do them all this time so if you are interested in one, email me so I can lock down the appropriate subject and locale.

Pick your poison and push the go button....

Saturday, November 9, 2013

Things that make you go Hmmmm...

Thought I would post these items up as their relevance, I believe, could be important...

Chinese Troops in US - Not A Conspiracy Theory

This is to coincide with the upcoming GridEx2 exercise being spearheaded by the fine folks over at DHS/FEMA.

Also worth noting....

Communications Down

Might want to spend some time on your commo plan.

Maybe get familiar with these items as well.....

The QBZ-95 and variants (top picture) is the standard issue assault rifle for the PLA. Manufactured by Norinco (remember, all those cheap import AK and M1A clones back in the 90's?) it fires the 5.8x42mm cartridge.....they also have a variant that fires the 5.56 NATO cartridge, the QBZ-97. Below that is the M99 anti-material rifle which fires a 12.7x108mm cartridge.....this also has a variant that fires the US .50BMG cartridge.

See a pattern here?

Thursday, November 7, 2013

Understanding the Intelligence Cycle


A good read on understanding the Intelligence building cycle. The questions you need to ask yourself as you read this are:

1) How can an enemy use this process against me?

2) How can I use this process against an enemy?

3) How would I need to modify the process to make it a useful tool in my unit's current configuration?


 "The enemy has a reserve which can be used to counterattack into either Objective BOB or Objective JOHN.   The initial CCIR was "Where will the enemy counterattack with his reserve?".    During your IPB you might identify the details about that reserve (it's the 1-23 Tank Battalion, etc), but you won't know WHERE it will attack until it actually starts to move.  During the wargame the staff realizes that the effect of this enemy action is significant enough that it will require the commander to make a decision on the use of attack helicopters.   This  becomes a Decision Point, and the CCIR is transformed into the more specific PIR: "Will the 1-23 Tank Battalion counterattack into Objective BOB or JOHN (between 0830 and 1330 hours)?"  Note that in order to qualify as a PIR you need three items: 1) A Single Question concerning an enemy status;  2) A link to a Decision Point (High Payoff Targets are just specialized Decision Points);  3) A specific time interval that the Question is related to the Decision."


To focus
Which drives
Which produces
DPs and HPTs
Each requiring
Which become essential tasks for
Collectors and Analysts



CCIR= Commander's Critical Information Requirements
CUB= Common Understanding of the Battlefield
PIR= Priority Intelligence Requirements
FFIR= Friendly Force Information Requirements
EEFI= Essential Elements of Friendly Information
HPT= High Payoff Target
HVT= High Value Target
IPB= Intelligence Prep of the Battlefield
DP= Decision Point
IR= Intelligence Requirements
BDA= Battle Damage Assessment

 (H/T Neil Garra & S2Company)

Wednesday, November 6, 2013

Auxiliary Blues...

Continuation (part 3) of the ongoing "learning through fiction" series.

Part 1      Part 2

John shifted uncomfortably as he pulled the scratchy, surplus wool blanket to his side to plug an annoying draft. He forced his eyes closed and tried to focus on the vibrations the big locomotive was producing....anything to quiet his mind from replaying the events of the last twelve hours. The adrenaline had finally subsided, but while his endocrine system may have adjusted to his current situation, his brain refused to be so accommodating. He started to stand from his curled up position in the corner of the cab behind the engineer. He was not quite erect before the engineer growled at him to keep out of sight or he would kick him out right here and now. John sunk back down, not wishing to be ejected into a pine tree at 50 some odd miles an hour.

The events from hours earlier began their mental replay again - after he had squeezed out of the tiny cafĂ© bathroom window and found no storm-trooper waiting to engage him in the alley, he knew he could not go home again and was officially on the run. He dashed to the opposite end of the alley, took a deep breath and stepped casually into the midday shopping crowd crawling the downtown sidewalks. He knew he had little time to create distance before they cordoned off the whole area for blocks in each direction. The general public had grown all too accustomed to the “snap checkpoints” and “safety inspections” that used to only exist in some abstract faraway combat zone. Remembering his training, he hunched down in the crowd as he slipped on the sock hat and glasses he had in his pocket. His heart sank as he approached the end of the block and an MRAP squealed to a halt, troopers jumping out and beginning to erect barricades. His mind raced.....he side stepped into a drugstore to try to compose a plan. He headed into the back employee area as if seeking the bathroom. Looking around he spotted a makeshift break area and some lockers. There were a couple employee smocks hanging near the lockers, the type with the store logo and plastic name tag. John grabbed one and slipped it on without skipping a beat. At that moment the back service door opened and an employee pushed a hand-truck through overflowing with sundry items. John nodded at the preoccupied worker and stepped out the door finding the delivery truck still running.....could he really be this lucky? he thought. He pulled the cargo door shut, jumped in and stepped on the gas. His disguise may not have been great, but it was good enough to get him through the chaotic checkpoint still being established.

He knew he was on borrowed time driving the delivery truck, as it was surely being reported stolen at this very moment. That, coupled with the fact that all vehicles were mandated by the regime to contain a “black box” which included GPS tracking and, rumor had it, a remote kill switch. He took the next exit off the freeway and pulled into the long term parking at the regional airport. He navigated the truck into a space in the middle of the sea of parked vehicles, locked the keys inside and struck out for the adjacent road that bordered the airport. He managed to flag down a cab leaving the terminal area and directed the driver to his next stop. John had chose the airport for a couple reasons. First, he hoped it would cause confusion as to where he was headed next and how he was getting there. Second, regime helicopters and drones would have to arrange airspace deconfliction with the airport which would buy him some more precious time. The cab drivers were technically required by law to scan a passenger's ID before leaving the curb, but luckily, few actually bothered with it. A short fifteen minutes later, the cab dropped John off in front of a school playground just as the sun disappeared to the west. John handed him the last 20 from his pocket and headed north away from the cab. Once the cab was out of site John spun around and ran back to the south. A couple blocks later and his destination came into view. He pulled himself over the fence and started towards the back of the poorly lit cemetery. By the time he had located his cache point and dug it up with the aid of a jagged rock, it had grown quite dark out. A condition he was grateful for as he noticed the red and blue light reflecting off the tombstones and trees around him.....

John thought back to his first assignment as an auxiliary member. He had been tasked with mapping the location of every surveillance camera in a particular section of the city. It seemed at first a rather menial task, but he soon realized, the more he looked - the more cameras he found. He had no idea just how prevalent the devices had become. He was to make a note of each camera's location followed by a simple description.....
Covert or overt?
Fixed or motorized?
Did it depend on a supporting light source?
Suspected field of view and angle?
Private, commercial or government?
If he could not make an accurate assessment on one of the requested items, he would indicate as such. It was his duty to supply raw information. The resistance Intel folks would further assess and develop it into useful intelligence. If he was able to do so without compromising himself, he was to take a close up photo as well. Once he compiled the data, he would create an overlay on a city map that had been provided to him.
About a week after turning in his assignment via dead drop, he received new instructions. He was to take the newly compiled city-wide overlay, find the surveillance gaps and plot as many routes in, out and through the city as he could. He was to do this for vehicles as well as for foot traffic.

That evening, in the cold cemetery, as he pulled the map from his cache, he sincerely hoped he had done a thorough job. 

.....Don't underestimate the relevance of the Auxiliary....

Monday, November 4, 2013

Rhodesians, Masada, von Trapp and ham-hocks...

In the last piece we read about the conditions the Rhodesian farmers had to exist under and some of the techniques they used to try and mitigate the dangers they faced. I would now like to look at another aspect of the homestead security problem, specifically, avoiding the siege scenario.

History has shown that sieges rarely end well for the people tucked inside the walls. From the stone fortress of Masada, to the massively fortified city of Sevastopol, to the wood framed building at Waco – history begs us to take note of the lessons.....and have a viable exit strategy on hand.

Dealing with small groups of bandits, looters and marauders in a SHTF scenario could in fact be a manageable problem dependent on your manpower, level of combat expertise and fortifications, but dealing with an antagonistic state level group (or even a well funded/equipped private entity) is a whole different animal as demonstrated in the three afore mentioned examples. What can make this especially difficult for us in the western culture (and the preparedness community in particular) is the psychological filter called normalcy bias that has been heavily institutionalized into us from childhood and endlessly reinforced via the media, our workplace and our social lives. Add to this situation your average prepper type, who has spent years and a small fortune accumulating all the gear and supplies they think they could ever need in their home or retreat. Getting this individual to leave their “stash” behind is going to be like trying to take a ham hock from a starving dog. They will convince themselves that somehow things will magically work out and they won't have to abandon their fortress....all evidence to the contrary. Concerned parties need to establish an escape and evade plan now, long before it is actually needed and accept the potentiality of a hasty exfil. The following can serve as a rough guideline:

1. Develop an early warning system.

This could vary from neighbors with FRS/GMRS/HAM radios, to remote CCTV cameras positioned on main avenues of approach. (You do know all the likely avenues of approach to your home don't you?). If you have early warning, then you can prepare accordingly – deciding on the proper defense or evasion plan based on the incoming threat and your current defensive capability. It goes without saying, the more standoff or distance you have between you and the first alert point the more time it buys you to make an assessment and execute your plan, but even standoff can be a double edged sword depending on where you live. If you live in an urban or suburban area with homes all around, you may not have any assurance that it is you or even anyone in your “tribe” that is being targeted. Leaving you waiting until the last minute to determine if you need to exit or not. This is a factor that should be addressed in your plan – which could equate to periodic false alarm/dry runs for your family, which is not necessarily a bad thing.

2. Don't have everything important in one place.

If you have a dozen firearms and 3000 pounds of food storage, there is no good reason to have it all consolidated at your house just begging to be collected by the local warlord or apparatchik . Establish safe houses and cache points off your immediate property with at least some basic essentials in them to keep you alive and kicking. At it's most rudimentary level a cache should be able to support you according to the rule-of-three's...

You can go - 3 minutes without air
                     3 hours without shelter
                     3 days without water
                     3 weeks without food
(I suppose we could add, 3 seconds without ammo in a gunfight)

A good mental exercise to help in this process is to visualize going for a jog. It is winter and lightly are wearing a jogging suit and running shoes, you have nothing else. You round the corner to your property only to see the local gestapo standing around your home as it burns to the ground. Your mind is immediately plunged into chaos.....what do you do? Having a plan at this point is the difference between positive action towards a predetermined LUP with cache or mentally freezing and doing something stupid and full of life ending bravado. Once you get to your LUP, you dig up your cache and check the inventory. Change of of shells....poncho liner....Max Velocity thermal shield.....collapsible flask....canteen cup......small pair of cheap binos....some mainstay bars.....iodine.....IFAK.....USB Linux disk...small flashlight...100 bucks in small bills.......pre made OTP and pencil. You examine your map under your camouflaged thermal shelter and plot a route to a safe house where you have some other items stored.....but first you sit tight and wait for the eye in the sky to finish it's survey.

3. Establish safe houses (think Auxillary).

This doesn't have to be as elaborate as hollyweird makes it out to be. Having a sympathetic acquaintance (or friend of a friend) who will store a bag for you and shelter you for a short period is not unrealistic for most people. Beware of using immediate family and well established friends for this purpose, as they will most likely be under surveillance if the "gov-gone-wild" folks are even remotely interested in catching you.

4. Establish cache points (as implied above).

Having a huge cache in your backyard doesn't do you a whole lot of good. You won't be able to get to it in a crisis and the badguys WILL find it. Do a map study (followed by walking the ground) and determine at least four avenues of escape. Once that is established, using good terrain analysis, pick some Laying Up Positions and/or cache points. How far you can safely move undetected after OPFOR knocks down your door is going to largely be a matter of your head start, your unique terrain and what air assets OPFOR is likely to bring to bear.....and what said air assets response time is (find out now). You and your family going “von Trapp” over the rolling South Dakota hills 30 minutes after contact is a sure way to get caught by the eye of Mordor. Get to know your terrain.

I recommend a tiered approach to caching:
Level One – Basic keep you alive items (think coffee can size)
Level Two – Basic plus, escape and evasion items, more ammo
Level Three- Basic plus, sustainment items & tools

Level one should be fairly universal for all folks, while two and three will vary depending on a focus of survival or resistance (though they don't have to be mutually exclusive of course).

In essence, this concept has much in common with the battle-drills practiced by any light infantry soldier. Trying to make a crucial decision at the moment of contact is a losing proposition, just as thinking you can win a siege from the inside is.

Friday, November 1, 2013

Home hardening in a real SHTF scenario...

Found via a commenter at Max's place ( original post HERE )

"After discussing in another thread the problems with the wooden building that are so often used elsewhere in the world I thought I would post my 2 cents on how its done in Africa at many farms I have visited and read about over the years.

Rhodesian Farmers Defensive Arrangements

The following is a general overview:

1) Most farmers fitted hand-grenade grills to the outside of all windows and Doors leading outside were likewise security grilled.

2) Many farmers built thick sand bag walls in front and under bedroom windows to stop bullets passing through walls and providing secured firing arc's. Beds were never placed against the outside walls of a farmhouse.

3) It was usual to have a designated safe room within the farmhouse that could be defended until support arrived. Sometimes this was a central corridor that allowed the farmer to move into other rooms to attack those outside through the windows. In the loft or ceiling over the safe room, some farmers laid sand bags to deal with possible mortar attack.

4) Every farmhouse in a given area was linked by a radio system called “Agric Alert”. This allowed radio contact with other farmers who formed their own defence units, usually under the umbrella of PATU (Police Anti-Terrorist Unit), which would react to a call from one of their neighbours for assistance. Another means of alarm raising was the use of a signal rocket - The Agric-Alert system was not done away with after the war, such was the lack of trust in Mugabe`s promises. It performed admirably as well when dealing with criminal activity such as stock theft. The alert system arranged for all farmers to check in with each other at a given time in the morning and evening as a means of monitoring their status.
South Africa also had such a system Called MARNET.

5) Around all farmhouse gardens were erected security fences with barbed wire (or razor wire) and which often had simple alarm systems built into them.
There were usually 2 fences were placed about 50 m apart with a ditch dig close to the inner one - the inner fence was usually very high 10 feet with barb wire and close to the main house, about 4 meters away, the outer fence was lower and alarmed with simple soda cans with stones inside that would rattle and wake the dogs if there were disturbed.

the reason for the 2 fences and ditch was much like todays BAR Armour on Hummers that you guys use .. the inner fence would catch grenades and they would then roll into the ditch and explode there causing little damage. and an RPG fired at the house would also be caught by the fence and do little damage to the mail house

Within the inner fence boundary, every farmer usually had a couple of large dogs. The dogs were fed their largest meal in the morning instead of the evening, in order to help keep them awake at night. Other farmers had geese or ducks, which made excellent guard “dogs.” Gardens were kept deliberately trim so as to keep clear fields of view and fire etc. The farm houses also had outside flood lighting erected in such a way as to blind those outside the fence, but not to interfere with the vision of those within the farmhouse.

the flood lighting often included hardened lighting, usually behind sand bags , reflectors were used to provide light from lights shining vertically upwards because lights are the first targets and if the reflectors were shot they still worked ... albeit with a few holes

6) All farmers and their wives were armed with an assortment of weapons, and most farmers were trained military men. They had at least one assault rifle, usually an FAL 7.62, assorted shot guns, .303 hunting rifles and so forth. It was also not unusual for wives to carry Uzi`s around with them, or other equivalents such as the Rhodesian Cobra. All members of the family were trained on the various weaponry available to them, including the kids. In one famous incident a child successfully fought off the attacking terrorists after both of his parents were wounded. The main defensive weapons were at all times within immediate reach of the adult farmhouse occupants, and were placed next to the bed at night.

7) Some farmers used mine protected vehicles, as a favourite of terrorists was to landmine the driveway outside the fence. A great deal of time was spent looking at the dirt roads for freshly dug earth points and so forth when driving around the farm.

8) Some farm gardens and particular points external to the fence were wired with home-made claymore like devices strategically placed in areas where attackers were likely to take cover. In a few instances farmers deliberately erected “cover positions” for the terrorists to use outside the fence, which were then blown up upon attack. A particular favourite was a section of plastic piping filled with nails, nuts, bolts, screws and so forth. I witnessed tests with these and the tubes cleared large areas of their intended aiming point of all bush cover and leaves from trees etc for about 30 meters into the bush. By placing a number of figure 8`s in front of these tests, it was apparent from the strike patterns that not one of them would have walked again had they been terrorists.

9)Out buildings were often fitted which screens of thin steel or wood the provide false cover to intruders who would have to stand behind the sheets to fire around the corners of buildings but could easily be picked off if they did, by firing through there cover."

Those farmers learned some hard lessons....take notes.

(H/T to Max Velocity, Tea Party Guy and xizero)

Saturday, October 12, 2013

Non Essential

I try to avoid being a "news" type blog, as there plenty of them out there already...but I had to post up this excellent video by the always astute Bill Whittle.


Thursday, October 10, 2013

OTP Practical Encryption Exercise

DanMorgan76 and Mosby had an excellent post up recently regarding One Time Pad encryption.  DM76-OTP

I wanted to add to that discussion by presenting another OTP method and a practical exercise for everyone to complete.....consider it a challenge. Dan explained the use of an alphabetic OTP (similar to a Vigenere square). I would like to present another method to consider in case you are struggling with the concept...

In this method, you first make a key of sufficient length for your messages (receiving party needs to have a copy of the same key) using a true random number generator, or some ten-sided dice. Next we are going to convert the text of our message into numbers. The common way to achieve this is with the use of a checkerboard template. There are many to choose from if you don't want to create your own....and I should point out that the strength of our encryption does not rely upon the use of one checkerboard over another, so don't feel squeamish about using an established one. Today we are going to use the CT-46 checkerboard. (Other charts can be found HERE)

A   E   I   N   O  R
1   2   3   4   5   6

B   C   D   F   G   H   J   K   L   M
70  71 72  73 74 75  76 77  78 79

P   Q  S   T   U   V   W  X   Y   Z
80 81 82 83  84 85 86  87 88 89

sp   .    ,    :   ?    /    (    )    "   code
90 91 92  93 94 95  96 97  98  99

0    1   2   3   4   5   6   7   8   9 
00  01 02 03 04 05 06 07 08 09

You would write out your message (plaintext), then using the CT-46, convert the letters, spaces, etc into numbers (90 is used for spaces and 99 will always proceed any prearranged brevity codes). For example:

My message is "need more supplies". Using the chart, I convert it to:


I then break it into 5 digit groups (for manageability),

42272 90795 62908 28480 80783 28200

I add zeros to round out my five digit group if needed. I would now write my key underneath (remember that the first five digit block is only used to identify the proper key/sheet to be used and is not used for coding) my converted message and subtract (without borrowing)...

           42272 90795 62908 28480 80783 28200      (unencrypted message)  
 84722 12345 54321 67890 09876 42791 03759      (one time key)
           30937 46474 05118 29614 48092 25551      (resulting cyphertext)

Your message at this point, having been successfully encrypted, is ready for transmittal via whatever media you find appropriate.

Once the receiving party is in possession of the encrypted message, they would:

1) Write it out....

30937 46474 05118 29614 48092 25551

2) Write their copy of the one time key (OTP) underneath...

30937 46474 05118 29614 48092 25551
12345 54321 67890 09876 42791 03759

3) Add to decrypt (no carrying)...

           30937 46474 05118 29614 48092 25551    (received cyphertext)
 84722 12345 54321 67890 09876 42791 03759    (one time key)
           42272 90795 62908 28480 80783 28200    (resulting decrypted message)

4) Use the agreed upon CT-46 chart to transfer back to letters...

4=N, 2=E, 2=E, 72=D, etc....

"need more supplies"

That is it in it's most basic form. Now for an exercise.....

Here is your encoded message:

63298 08898 54185 74545 28036 90438 94601 15438 01595 61992 14806 35390 75859 32537 54814 64357 58071 78754 84143 24420 53207

As you can see, it consists of 21 five digit groups, which should be written out on your paper on one line, if possible.

Here is your OTP/Key:

65098 20564 92039 47602 18383 11047 66384 06748 93947 28596 23489 63486 58618 68943 68656 46023 98650 83612 07538 09865 83497 69803 24730 96913 75348 (don't forget, the first block is not used to decrypt)

Once you have decrypted the message, feel free to comment with the author's name. (I kept it pretty straight forward; no unnecessary punctuation or end of message indicator such as BTAR or NOFO. You should develop your own SOP's regarding such things.)

The time to get these skills solidified is now folks......while we have the luxury of having internet and the free time to read blogs such as this. Trying to learn this stuff when the world has gone sideways could be a nonstarter.

Monday, October 7, 2013

Update On The INTEL Backdoor Scandal

Just an FYI for everyone regarding Intel Corporation's newer CPU's with built in hardware backdoor.

Go to this link...INTEL , and look for your CPU on the list. If you find it, you have one of the "backdoor-ed" models. They claim you can disable the feature in the BIOS under the Intel ME advice - get rid of it and go with something older or with an AMD cpu.

News release here.....CPU Spying

** To find out your CPU version:

- Windows = Control Panel -> System -> General  , or install CPU-Z

- Linux = open a terminal, type -  cat /proc/cpuinfo , or install CPU-G

- Mac = open a terminal, type - sysctl -a machdep.cpu.brand_string

Sunday, October 6, 2013

A Timely Quote It Would Seem

"Before a revolution can take place, the population must lose faith in both the police and the courts.

High taxation is important and so is inflation of the currency and the ratio of the productive to those on the public payroll. But that's old hat; everybody knows that a country is on the skids when its income and outgo get out of balance and stay that way - even though there are always endless attempts to wish it away by legislation. But I started looking for little signs and what some call silly-season symptoms.

I want to mention one of the obvious symptoms: Violence. Muggings. Sniping. Arson. Bombing. Terrorism of any sort. Riots of course - but I suspect that little incidents of violence, pecking way at people day after day, damage a culture even more than riots that flare up and then die down. Oh, conscription and slavery and arbitrary compulsion of all sorts and imprisonment without bail and without speedy trial - but those things are obvious; all the histories list them.

I think you have missed the most alarming symptom of all. This one I shall tell you. But go back and search for it. Examine it. Sick cultures show a complex of symptoms as you have named... But a dying culture invariably exhibits personal rudeness. Bad manners. Lack of consideration for others in minor matters. A loss of politeness, of gentle manners, is more significant than a riot.

This symptom is especially serious in that an individual displaying it never thinks of it as a sign of ill health but as proof of his/her strength. Look for it. Study it. It is too late to save this culture - this worldwide culture, not just the freak show here in California. Therefore we must now prepare the monasteries for the coming Dark Age. Electronic records are too fragile; we must again have books, of stable inks and resistant paper."

-- Robert Heinlein (Friday, 1982)

......which segues nicely into.....

“Be courteous to all, but intimate with few, and let those few be well tried before you give them your confidence. True friendship is a plant of slow growth, and must undergo and withstand the shocks of adversity before it is entitled to appellation. ”

-- George Washington

Friday, October 4, 2013

Wilder Tactical Review

Arctic Pilgrim has an ongoing review of Wilder Tactical's IWB holster. Check it out here..


Josh has been doing some great work with OWB holsters and grip texturing as well. (Full disclosure - Josh is a personal friend...but don't hold it against him)

(His new "Swiss Cheese" holster)

Wilder Tactical

Thursday, October 3, 2013

Regarding Living Off The Land Delusions...

Interesting debate over at WRSA in the comments following "Living off the land delusions..."


Wanted to add to that topic since I have some experience on the subject.

Specifically, I want to address -

- Stated requirement of 3000 calories a day
- Switching from a modern diet to a more agrarian/paleo diet
- Real-world calorie deprivation effects on performance

As opinions on the subject are plentiful and often not based on reality I will limit my commentary to what I have experienced firsthand.

I spent a ~90 day rotation in an operational setting living on a very carefully measured 1200 calories a day. I slept 7-8 hours a night, worked out ~3 hours a day, conducted range/tactical training everyday and conducted my assigned duties as well. This was in a very high altitude mountain environment. I began at a fit 210 pounds. The first two weeks were a bit difficult to adjust to, but after that it was smooth sailing. Regarding workouts, I managed to not lose any strength, but made no appreciable gains in strength. At the end of that 90 day period I was VERY lean as I had lost about 25+ pounds. While I lost a lot of fat, I also lost some muscle, but was able to perform all my duties without any real difficulty.

On an earlier deployment, we spent a few months conducting reconnaissance patrols which meant living of of stripped down MRE's. While MRE's are designed to be calorie dense, they create a special kind of havoc in your GI tract. I recall augmenting our diet with local fruits whenever we could, which was a real morale boost if nothing else. I remember a colleague of mine talking about his time in Recondo school "back in the day". He had gone days without eating when he was able to kill a tiny snake and roast it up for chow. He described the energizing and moralizing effects of the hors d'oeuvre size meal as "incredible".

I would also note that when I am conducting my classes I rarely eat during the course of the day. It's not necessarily intentional, it just happens as I am so busy with the COI. Usually wrapping up at the 12th hour of an 8 hour training day, my stomach will make it's demands known.
Lesson learned: I can effectively operate for at least 90 days on a calorie deficient diet. (It should be noted that environmental conditions were moderate to poor. Extreme conditions would have made an impact on the outcome.)

Another time I decided to check the effects of sustained zero caloric intake. I went 7 days with no calories, just water. I still worked and worked out (for the first few days).
Day 1 and 2, I felt fine physically and was able to workout normally. Mentally, I found myself thinking of food more and more. Day 3 was awful. My energy levels crashed substantially, my morale plummeted and my workout was fairly pathetic. Day 4 I kind of levelled out a bit. I found I had to sleep more and my workouts ceased as I simply did not have the energy to both workout and do my job. Days 5-7 I seemed to reach some equilibrium. My energy levels were low, but I was functional. I had increased my sleep to around 10 hours. I thought about food constantly, but it wasn't as distracting as it was earlier in the week. I lost close to 15 pounds over the week, but gained it back quickly when normal eating resumed.
Lesson learned: I know I can go a full week with no eating and still perform at an acceptable (but miserable) level. Bear in mind, I was not dealing with particularly harsh weather or sleeping in the wild, as these factors would also contribute unfavourably to your situation and would need to be accounted for.
Another factor to bring up is our bodies' ability to make the shift from the modern western diet to the agrarian/paleo style diet. This will of course vary wildly based on your current eating habits. I'm sorry to say, but if you eat a rather typical American diet, you are going to have a rather uncomfortable, if not crippling transition to make. The smart move is to begin that transition slowly right now. Start by cutting down on "boxed", processed and sugar laden foods. Eat more raw fruits and vegetables instead of cooked to help adjust enzyme production. Eat less canned products and baked goods. Try to remove white, processed sugar from your diet entirely. Instead satiate your sweet tooth with fruits. Branch out and try eating less common and more organic meats, like bison, rabbit, quail, lamb, local fish and organic pork. This will help "adjust" your system as well as condition your palette to more "gamey" flavors. I remember eating goat for the first time overseas, it was difficult to get down due to the overpowering gamey taste. Another trip I had horse ka-bobs and I have to say, not too bad at all.....just say'in.

The last point I would bring up, which is a touch off topic but bears mentioning is, oral hygiene. How many of you have made provisions for the future care of your teeth? Some people are blessed with a higher oral pH and a genetic disposition towards an oral environment unfriendly to destructive bacteria and acids, but they are in the minority. Having tooth care products such as brushes, floss, xylitol and an emergency filling kit + extraction tools can have a significant impact on your future quality of life.

Might look into the book "The Great Starvation Experiment" for some interesting data. It covers Ancel Keys' experiments on 36 volunteers near the end of WWII.

Sunday, September 29, 2013

...And Little Brother Too

The 1986 Electronic Communications Privacy Act allows domestic law enforcement agencies—everyone from the Federal Bureau of Investigations to your local Keystone Cops—to contact email hosts and, without a warrant, demand they turn over the full contents of all emails over 180 days old.”

Take the following article for what it's worth, but it does bring up some interesting points.

So, we should toss our radios, phones and laptops right? Not so fast...

In regards to the inevitable response of "only talk face to face"....that's great, but I'll have to insist that it is a rather narrow stance to take. Reality will dictate that logistics and or security will become a major impediment to meat-space-only information sharing, for what I should think would be obvious scenarios. Even if you take the popular position of "local, local, local", how big is local for you? Geographically and demographically? You may have decided on a small chunk of earth to be your AO, but I assure you you are going to want frequent G2 on what is "going on" in the layers beyond the compact border that constitutes your larger battlespace. Not to mention the fact that as things erode more and more, face to face link ups will present their own set of unpleasant hazards - and even more so if you are not communicating your intent and the conditions of your meet beforehand in some fashion....ask anyone that has had to "link up" with friendly forces in an active zone unannounced and with busted comms. Friendly fire is a shitty way to end the day...

This should not be construed as a put down on bolstering your local affiliations or having a meeting with your guys, just a reminder to not give up on what could end up being some of the most precious tools you have at your disposal. Just remember that technological tools, in all their varied forms, are to be likened to fire.......a nearly indispensable tool that must be carefully controlled – or you will get burned.

The truth is, safely utilizing these items demands active user involvement. Just like the other skill sets – running a gun like a pro takes constant training and effort......donning your kit and ruck in the middle of the night to run across the back 40 because your neighbor needs help, takes regular conditioning......medical emergencies need a cool, knowledgeable head that only comes from regular hands on training. The comms piece is no different – learn to be effective with your equipment.

Tangible fixes for these issues will be forthcoming....stay tuned.

Friday, September 27, 2013


Sorry folks, been crazy busy with life and all that. Here are a couple sources to brush up on while I work my next piece....

1. Good series from a few years back...  Dark Arts

2. Gathering of info on the tech front....Prism Break

Wrap your gray matter around that for a bit.....

Be back...

Thursday, August 1, 2013

Improve Your Pistolcraft...

Between the rifle and the pistol, I will generally spend more training time on the pistol. There are a couple reasons for this...

1) All things being equal, it takes more skill to be consistently accurate with a pistol than with a rifle - the rifle having the benefit of a longer sight radius (or optics) and the inherent stability that comes with a stocked firearm. (Not to mention the weight-to-trigger pull ratio disparity with a pistol).

2) Unless you are a rifleman deployed on the battlefield, you are going to spend the lion's share of your time armed with a pistol. Walking through the local supermarket with a rifle slung across your chest tends to get the locals excited.

3) Pistols fire a relatively weak projectile compared to rifles in general and thusly, may require more follow-on hits to get the job done; making recoil management, sight tracking and reload skills a must.

Here are some of the key training factors I always try to hit on every time I train:

1) Engagement speed. In it's purest form, this is recording the time it takes you to draw your pistol and place a round in the effective zone of your target. I like to rotate between a paper target, like an IPSC/IDPA, and a C-zone size steel, like the one pictured above.
Like I pointed out earlier, we don't usually walk through town with a rifle slung, likewise most people carry their pistol concealed; therefore, you should do most of your drills from a concealed draw. Granted, I will be faster on target with an exposed belt holster or thigh rig, but if you don't spend some quality time practicing clearing that cover shirt , you are setting yourself up for some real world failure.
They way I usually run this is: Set up at the 10 meter line facing an IPSC or C zone steel (steel has a 20 degree down angle to prevent return fire), arms naturally at sides (you can mix it up and do it from the surrender or while holding something else in your hands - like a cup of coffee and a magazine). On the buzzer, draw for one hit. With an overt holster I try to keep my time at 1.00 second or less (I can generally stay around .90). For concealed carry, try to keep it under 1.50 (my last run was 1.22).

2) Multiple targets. If you aren't regularly practicing multiples you are leaving a large hole in your skill set. (Your odds of facing groups of attackers is only going to grow as our society decays - in my opinion at least.) These types of drills will really give your eye muscles a workout as they have to make rapid and multiple focal transitions. The El Presidente drill is a well proven tool for this (or a Vice Prez if you want to conserve ammo). What I have found to be a good technique is; after you have made your first shot, your eyes will be focused on your front sight. As you begin to shift to the next target, you will lead with your eyes (the pistol actually trailing slightly behind) shift your focus to the next target and when the pistol "shows up", shift back to a front sight focus.....repeat process until finished. The transition period I just described only occurs in maybe a second, but a key training point to remember is to start slow and deliberate, making sure to get the whole process down....then start pushing the speed. Your goal is to shoot an El Prez in under 10 seconds, all A zone hits. Another aspect of training for multiples is to change up the order....shoot them left to right - right to left - center and out - back and forth. Since in real life you will need to assess the most prominent threats and assign a quick threat hierarchy, engaging the closest and/or most dangerous first. 

3) Accuracy. There are many really good drills for developing accuracy, like the 700 Aggregate and Dot Torture. One that I use frequently is this: Shooting at an IPSC or C zone steel (works best with steel due to the distances involved), walk to the 15 meter line, fire for one hit - strong hand only, transfer to support hand - one hit, freestyle - one hit (you must achieve a hit on the steel before moving to the next hand). 25 meter line - same thing. 50 meters - same thing. 75 meters - same. 100 meters - same. Most shooters find this a rather daunting drill, but give it a chance - those distance shots really teach you to develop your sight alignment and trust your sights. This drill can net you some big gains in the accuracy department. Keep a log as you do this drill and record how many shots you needed to get your hit at each station. As your number of dropped shots decreases, start to add some time constraints to the drill.

4) Manipulation Skills - In Particular, Reloads. My favorite drill for this by far is the 3-3-3 drill. I like to shoot this from the 10 meter and the 25 meter line. You set up at the 10 with three magazines of three rounds each. One mag loaded and the other two in their mag pouches. On the buzzer, draw shoot three on steel, reload, shoot three, reload, shoot three. All rounds need to hit for time to count. You want to try to keep it under 10 seconds. If you go on Youtube you can find Kyle Lamb (SGM, Ret.) shooting this drill (I think he calls it the "Reload drill") in 6.41 seconds. My best time is 5.52 seconds.....although I have a sneaking suspicion that Kyle could smoke my time if he really tried. When I shoot this drill from the 25 meter line, it usually increases my time by at least 50%.....which brings up another good topic - you need to apply the right amount of gas for the right amount of distance. 

5) Shooting On The Move. This is another important one that I rarely see people training on.....and when I do see it, they are shooting while walking straight towards the target. I understand there could be a legitimate reason to close the gap straight on with your target - but in most cases, we move while shooting to make ourselves a harder target to hit. Moving straight towards an active shooter does not make us harder to hit (in point of fact, we become a perceptually larger target)....moving laterally does. It takes a fair amount of practice to get good at shooting on the move, which is why I always make time for it. The technique, in a nutshell, boils down to - using your lower body to absorb the "up/down" action normally present when we walk; and keeping your elbows slightly flexed to help mitigate any negative torso movement. I tell students - walk like you would if you were holding a full-to-the-brim cup of scalding hot coffee. Try walking lateral to the target at the 15 meter line while engaging. Many shooters will get the "strobe" effect when they first try this....walking until they actually break the shot at which time they basically stop moving. Try to avoid this. Start with a slow, consistent pace and as your hits improve, quicken your pace.

This is by no means exhaustive, but represents the cornerstone of a good training regimen. Adding malfunction drills, shooting from cover, positional shooting, rhythm drills, stress fire and wounded shooter drills can also be of great benefit.    


Saturday, July 27, 2013

More On Privacy...

WRSA provided a link to an excellent whitepaper on encryption and privacy setups.


I strongly encourage all to read it. This is some of the material that we cover in our "Groundrod" course. Looking at an early September class date - possibly in Idaho.

More to follow.....

(Sorry for the light posting, been busy...)

Friday, July 5, 2013

Survivalblog Info


JWR's Survivalblog site has been down for a few days......his backup server can be reached here.....

Wednesday, June 19, 2013

Re take Your Privacy and Communication Security

With the recent revelations pertaining to government spying on it's own citizens (does this really surprise anyone?), I wanted to offer a quick primer on regaining some of your electronic security. This is by no means an exhaustive list, but a number of things you can start doing right now. (I also offer a course on this subject that covers it in great detail.)

One caveat I need to point out before we go further is this - While any and all of the following tips will offer a high level of privacy, most of them are rendered potentially useless if they are employed on the Windows or Mac operating systems. Why? Because Microsoft and Apple have entered into complicit agreements with government bodies in the form of secret backdoor access to your system and no anti-virus or malware  program will save you from it as it is a "legitimate" part of the operating system's code.
Where does that leave you? Either install a Linux based OS, or at the very least get a bootable  USB linux system. 
Now, there are those (including MS and Apple) that will argue that there is no such thing and this is just wild tinfoil hat talk. Ultimately it boils down to this for I trust organizations that have a track record of disregard for client privacy and offer software that is closed source and hidden from public audit - or do I trust a product that is designed with privacy in mind and is open source and regularly audited by the public?

Backdoor Info 1          

Moving on.......

1. Stop using Yahoo, Google and Hotmail for your email. In the last week alone I have received at least 4 emails from "friends" who had their accounts hijacked/hacked (all Yahoo).  Consider smaller email providers that will respect your privacy......GMX, Lavabit, Hushmail just to name a few. That doesn't mean that you can completely trust these providers, it simply means they will not read your email for marketing purposes and will only surrender information to governments within the appropriate judicial process.(You still would need a VPN or Tor to mask your IP address and PGP keys to encrypt your content - but that is another article all by itself)

2. Stop using Yahoo, Bing, Google for your searches. Instead use DuckDuckGoStartpageIxquick or Privatelee.

3. Stop using Skype and Google voice. Instead try out options that offer encrypted calls like iCall and Jitsi. You can setup a free phone account with Ostel - they have instructions on their site to setup the phone software.

4. Setup a chat/instant message account using Pidgin (Adium on Mac) or Jitsi, which will allow encrypted communication via OTR. I recommend setting up an xmpp account for free with DuckDuckGo HERE

5. Encrypt any personal data in a separate drive with Truecrypt or LUKS (use the Encfs Manager in Linux)

6. Start using a VPN service (one that utilizes openvpn protocols)

If you are considering a move to a Linux based system, here are a few places to start....

If you are used to using Windows try - Zorin OS 

If you are used to using Mac try - Pear OS

or give these a try - Ubuntu or Mint

These are just the tip of the iceberg, but will get you started on the road to recovery......

Sunday, June 16, 2013

After Action Report - May Courses


(Note: I am testing out a new website at CombatStudiesGroup.weebly as i am hoping to abandon all things Google in the near future - feel free to check it out.)

This is a much belated AAR for the May Gunfight Carbine and Secure Comms courses.

Once again I would like to thank Matt from Liberty Handgun Training for facilitating the courses. He put in a lot of legwork to make these classes happen.

We had a full class for the carbine course and everyone pushed themselves hard for 11 hours of rain drenched training. Some of the participants were former students of Mosby ( and had only good things to say about him. It also served to demonstrate the point that, while tactics and techniques may vary between instructors/operators, they will (or should) share the same core fundamental principals.

The students were kind enough to send in some reviews, one of which is below (you can find the rest on the Reviews page)....

"I wanted to thank you for the course last weekend. Your ability to train top level Operators and day one beginners side by side never ceases to amaze me! I know that I was challenged, informed, and educated in a short period of time. The techniques on clearing malfunctions will never leave me. I've never seen some of the malfunctions you showed us how to clear, and I would consider myself an average/moderately experienced shooter with the AR platform.
What I took from your course was the foundation I need to build on to successfully employ this platform effectively and accurately as a new and intermediate user. If only I would have had this base years ago, I'd be a far more proficient shooter!
The information you shared on equipment and how it effects performance was eye opening! I don't think a single person left the training area without making the decision to purchase better equipment! I know I didn't! Those kinds of critiques and advice can only come from years of experience like yours.
Thank you Kris, I have no doubt that I'll be at your next class. "

The secure comms class ran about 10 hours. It was the maiden voyage of that particular curriculum  and we got a lot of the kinks ironed out over the course of the day.  By the end of class everyone  had a good under standing of how governments, corporations and hackers exploit our routine communications and data storage and what they can do to prevent such activities. Everyone was able to build a functional "Red" system and some students even got an "Orange" system up and running. One student sent in the following review......

"Kris provides the practical knowledge needed to truly have secure data communications. He brings to bare an awareness of your own personal risk communicating across the Internet and then delivers the instruction, tools, and process to significantly reduce your vulnerability. When class was finished, I had a hands-on understanding of LINUX, TOR, VPN, Tails, PGP, and creating a password template. Great class, I only wish there was more time to pick Kris’s brain."

We will continue to fine tune the secure comms course to help people to re-take their privacy (which is a cornerstone of liberty in my opinion), even as more and more of our data is spied on by various state and non-state actors.

Monday, May 13, 2013

Upcoming Courses

We will be having a Combat Carbine course on May 18 and a Secure Communications course on the 19th. Both courses will be sponsored by Liberty Handgun Training and will be held in Eugene Oregon.

The carbine course is almost full, but we still have open seats for the communications class. Details as follows...........

Gunfight Concepts Carbine - May 18th, 8am-5pm

The purpose of this course is to push the carbine shooter to the next
level and help ensure that they prevail in a lethal encounter.
I follow a template of enhancing the students ability to master -

- Marksmanship
- Manipulation
- Maintenance

We will examine the pros/cons of the different battle zeros and which
one may suit your situation best. We will perform several drills
designed to enhance your accuracy at various ranges and examine the
application of the speed/accuracy paradigm. We will cover reload
techniques designed to get you back in the fight faster. We will also
study dealing with severe stoppages and various aspects of keeping your
gun functional in less than ideal settings.

My overall approach to this training could be summed up as "worst case
scenario training." You will be pushed hard, shoot from uncomfortable
positions, have many many malfunctions, and learn to come out on top.
Even the best combat shooters in the world will lose around 50% of
their accuracy under the stresses of combat action.......your training
needs to reflect that reality.

Gear Required:

- AR/M4 style carbine w/optics and iron sights (AK style is okay, just
give me a heads up)
- Minimum six carbine magazines
- Semi auto pistol (9mm or greater)
- Minimum three pistol magazines
- Plate carrier w/ at least three mag pouches, or Rhodesian style vest,
or carbine mag pouches for belt rig
- Duty belt w/holster and pistol mag pouches
- Carbine sling (one or two point)
- Eye and ear protection
- Firearm maintenance gear (lube, tools, spare parts)
- Comfortable, durable clothing, change of clothes, towel
- Optional support gear.......dump pouch, gloves, knee pads, etc
- Food and water for the day


500 rds carbine
100 rds pistol

Course fee is $200


Secure Comms - May 19th, 8am-5pm

This course is designed to teach the student to recognize the security
and privacy threats that we find ourselves exposed to in this day and
age. Students will bring their own laptops and will learn how to harden
them in real time. We will also explore the history of various
encryption protocols and their employment, from computer based to paper
and pencil.

Topics covered will include:

- Protecting your data from unlawful intrusion
- Setting up and successfully sending secure email
- Setting up and utilizing secure chat
- Surfing the web anonymously
- Demonstrations of how common exploits occur
- Pros and cons of the various operating systems
- Communicating in a non-permissive or hostile environment

Instead of just watching slide shows and listening to lecture, the
student will participate in real time and successfully complete each
block of instruction. A final exercise will be included to test your
skills in a hostile setting.

Students will need to bring:

- Laptop computer
- Smartphone (optional)
- Note pad and pens/pencils
- Two USB/thumbdrives with at least a 4GB capacity each
- One MicroSD card (any size) with reader adapter

Course fee is $150


Any questions can be forwarded to the host at

or to myself at the email link at the top of the webpage.

Tuesday, April 16, 2013

Standard Modus Operandi

In light of current events, I believe a little history on the Hegelian Dialectic is in order...


"...the State 'has the supreme right against the individual, whose supreme duty is to be a member of the State... for the right of the world spirit is above all special privileges.'" Author/historian William Shirer, quoting Georg Hegel in his The Rise and Fall of the Third Reich (1959, page 144)

In 1847 the London Communist League (Karl Marx and Frederick Engels) used Hegel's theory of the dialectic to back up their economic theory of communism. Now, in the 21st century, Hegelian-Marxist thinking affects our entire social and political structure. The Hegelian dialectic is the framework for guiding our thoughts and actions into conflicts that lead us to a predetermined solution. If we do not understand how the Hegelian dialectic shapes our perceptions of the world, then we do not know how we are helping to implement the vision. When we remain locked into dialectical thinking, we cannot see out of the box.

Hegel's dialectic is the tool which manipulates us into a frenzied circular pattern of thought and action. Every time we fight for or defend against an ideology we are playing a necessary role in Marx and Engels' grand design to advance humanity into a dictatorship of the proletariat. The synthetic Hegelian solution to all these conflicts can't be introduced unless we all take a side that will advance the agenda. The Marxist's global agenda is moving along at breakneck speed. The only way to completely stop the privacy invasions, expanding domestic police powers, land grabs, insane wars against inanimate objects (and transient verbs), covert actions, and outright assaults on individual liberty, is to step outside the dialectic. This releases us from the limitations of controlled and guided thought.

When we understand what motivated Hegel, we can see his influence on all of our destinies. ... Hegelian conflicts steer every political arena on the planet, from the United Nations to the major American political parties, all the way down to local school boards and community councils. Dialogues and consensus-building are primary tools of the dialectic, and terror and intimidation are also acceptable formats for obtaining the goal. The ultimate Third Way agenda is world government. Once we get what's really going on, we can cut the strings and move our lives in original directions outside the confines of the dialectical madness. Focusing on Hegel's and Engel's ultimate agenda, and avoiding getting caught up in their impenetrable theories of social evolution, gives us the opportunity to think and act our way toward freedom, justice, and genuine liberty for all.

Today the dialectic is active in every political issue that encourages taking sides. We can see it in environmentalists instigating conflicts against private property owners, in democrats against republicans, in greens against libertarians, in communists against socialists, in neo-cons against traditional conservatives, in community activists against individuals, in pro-choice versus pro-life, in Christians against Muslims, in isolationists versus interventionists, in peace activists against war hawks. No matter what the issue, the invisible dialectic aims to control both the conflict and the resolution of differences, and leads everyone involved into a new cycle of conflicts.

We're definitely not in Kansas anymore.



"Dialectic ....the Hegelian process of change in which a concept or its realization passes over into and is preserved and fulfilled by its opposite... development through the stages of thesis, antithesis, and synthesis in accordance with the laws of dialectical materialism ....any systematic reasoning, exposition, or argument that juxtaposes opposed or contradictory ideas and usually seeks to resolve their conflict ...
....the dialectical tension or opposition between two interacting forces or elements."

"Dialectical Materialism ... 1 : the Marxist theory that maintains the material basis of a reality constantly changing in a dialectical process and the priority of matter over mind."


"Hegel's dialectic often appears broken up for convenience into three moments called "thesis" (in the French historical example, the revolution), "antithesis" (the terror which followed), and "synthesis" (the constitutional state of free citizens). ... Much Hegel scholarship does not recognize the usefulness of this triadic classification for shedding light on Hegel's thought. Although Hegel refers to "the two elemental considerations: first, the idea of freedom as the absolute and final aim; secondly, the means for realising it, i.e. the subjective side of knowledge and will, with its life, movement, and activity" (thesis and antithesis) he doesn't use "synthesis" but instead speaks of the "Whole": "We then recognised the State as the moral Whole and the Reality of Freedom, and consequently as the objective unity of these two elements." ...

"Hegel used this system of dialectics to explain the whole of the history of philosophy, science, art, politics and religion, but many modern critics point out that Hegel often seems to gloss over the realities of history in order to fit it into his dialectical mold....

In the 20th century, Hegel's philosophy underwent a major renaissance. This was due partly to the rediscovery and reevaluation of him as the philosophical progenitor of Marxism by philosophically oriented Marxists, partly through a resurgence of the historical perspective that Hegel brought to everything, and partly through increasing recognition of the importance of his dialectical method. The book that did the most to reintroduce Hegel into the Marxist canon was perhaps Georg Lukacs's History and Class Consciousness. This sparked a renewed interest in Hegel reflected in the work of Herbert Marcuse, Theodor Adorno, Ernst Bloch....

"Beginning in the 1960's, Anglo-American Hegel scholarship has attempted to challenge the traditional interpretation of Hegel as offering a metaphysical system." See Popular Occultism

The Hegelian dialectical formula: A (thesis) versus B (anti-thesis) equals C (synthesis).

For example: If (A) my idea of freedom conflicts with (B) your idea of freedom then (C) neither of us can be free until everyone agrees to be a slave.

The Soviet Union was based on the Hegelian dialectic, as is all Marxist writing. The Soviets didn't give up their Hegelian reasoning when they supposedly stopped being a communist country. They merely changed the dialectical language to fit into the modern version of Marxist thinking called communitarianism. American author Steve Montgomery explores Moscow's adept use of the Hegelian dialectic in Glasnost-Perestroika: A Model Potemkin Village.

How is it possible to consider a Hegelian argument?

 If the ideas, interpretations of experiences, and the sources are all wrong, can a conclusion based on all these wrong premises be sound? The answer is no. Two false premises do not make a sound conclusion even if the argument follows the formula. Three, four, five, or six false premises do not all combine to make a conclusion sound. You must have at least one sound premise to reach a sound conclusion. Logical mathematical formulas are only the basis for deductive reasoning. Equally important is knowledge of semantics, or considering the meanings of the words used in the argument. Just because an argument fits the formula, it does not necessarily make the conclusion sound. Georg Wilhelm Friedrich Hegel knew this when he designed his dialectic.

Hegel is an imperialist con artist who established the principles of dialectical "no-reason." Hegel's dialectic has allowed globalists to lead simple, capable, freeborn men and women back into the superstitious, racist and unreasonable age of imperial global dominance. National governments represent people who are free from imperial controls over private property, trade and production. National governments protect their workers from imperial slavery by protecting the worker's markets. But if you use Hegel's logical Marxism, the only way to protect people from slavery is to become the slave trader, just for a while. Twisted logic is why cons are so successful, and Hegel twisted it in such a way as to be "impenetrable." Like Hegel and Marx, the best street con knows his spiel has to use logic to bend and distort the story, and good cons weave their lies on logical mathematical progression. The fallacy is in the language, not in the math. Detective Phillip Worts' 2001 article Communist Oriented Policing is a nice explanation of Dialectical Materialism's influence on America.

The communitarian purpose for the Hegelian dialectic

Hegel's theory is basically that mankind is merely a series of constant philosophical conflicts. Hegel was an idealist who believed that the highest state of mankind can only be attained through constant ideological conflict and resolution. The rules of the dialectic means mankind can only reach its highest spiritual consciousness through endless self-perpetuating struggle between ideals, and the eventual synthesizing of all opposites. Hegel's dialectic taught all conflict takes man to the next spiritual level. But in the final analysis, this ideology simply justifies conflict and endless war. It is also the reasoning behind using military power to export an illogical version of freedom and false democratic ideals.

The reason we can call it the justification for modern conflicts and war, with impunity, is because no one can prove Hegel's theory is true. No matter how many new words they make up to define it, or how many new theories they come up with to give it validity, we can prove beyond a doubt that it is all false. And, we can show the final equation in Hegels' Dialectic is:

A: The [your nation goes here] System of Political Economy (List 1841)
B: state controlled world communism
C: state controlled global communitarianism.

The Hegelian dialectic is the ridiculous idea that constant conflict and continual merging of opposite ideologies, as established by extreme right or left belief systems, will lead spiritual mankind into final perfection. (Americans understood man's spiritual quests to be outside the realm of government control). Hegel's brilliance rests in his ability to confuse and obfuscate the true motives of the planners, and millions of people world-wide have been trying to make sense of why it doesn't work for over 150 years. But like the AA definition of insanity, the world keeps trying it over and over expecting different results. ...

When Frederick Engels and Karl Marx based their communist theory on Hegel's theory of spiritual advancement via constant resolution of differences, they based the theory of communism on an unproven theory.

While Darwin's theory of evolution is still being debated, there's absolutely no proof that societies are continually evolving. When Engels and Marx later based their communist theory on Lewis Henry Morgan's theory of anthropology in 1877, they again based the theory of communism on an unprovable theory.

And when Amitai Etzioni used Hegelian reasoning to base the Communitarian Network on a "balance" between (A) Rights and (B) Responsibilities, he built the entire theory of (C) communitarianism on nothing but disproven and unprovable unscientific theories....

Already gaining substantial ground against the Americans, British Marxism was bolstered when Charles Darwin published his theory of human evolution in 1859. Engels, according to modern day scholars, seized upon Darwin's theory to substantiate communism:

"When Marx read The Origin of Species he wrote to Engels that, 'although it is developed in the crude English style, this is the book which contains the basis in natural history for our view.' They turned against what they saw as the social, as opposed to the biological, implications of Darwinism when they realised that it contained no support for their shibboleth of class oppression. Since they were slippery customers rather than scientists, they were not likely to relinquish their views just because something did not fit." (see: Marxism and Darwinism by Anton Pannekoek, 1912.)

In 1877 Lewis Henry Morgan published Ancient Society, or Researches in Life, Lines of Human Progress from Savagery, through Barbarism, to Civilization. Then the "slippery" Engels seized upon Morgan's work as the constantly "evolving" basis for the totally unsubstantiated theory of natural social evolution into utopian world communism....

Hegel's formula has been so successful that in 2003 all U.S. domestic and foreign policy is dominated by "communitarian thinking," the whole country is living under the new laws, and yet Americans most affected by "impenetrable" Hegelian laws have never once heard the term used.


The Hegelian dialectic presupposes the factual basis for the theory of social evolutionary principles, which coincidentally backed up Marx. Marx's Darwinian theory of the "social evolution of the species," (even though it has been used for a century to create a vast new scientific community, including eugenics and socio-economics), does not adhere to the basis for all good scientific research, and appears to exist mainly to advance itself, and all its sub-socio-scientific arms, as the more moral human science. To the ACL this means the entire basis for the communitarian solution is based on a false premise, because there is no FACTUAL basis that "social evolution of the species" exists, based as it is only on Darwinian and Marxist ideology of man's "natural" evolution towards a British version of utopia.

The London-Marxist platform in 1847 was "to abolish private property." The American Revolution was based in private property rights. Marxist societies confiscate wealth and promise to "re-distribute it equally." America promised everyone they could keep and control what was the product of their own labor. Modern Marxist adherents openly claim they will "rebuild the world," and they train activist "change agents" to openly support overthrowing the legitimate governments of the world. Since their inception, Marxist agent provocateurs can be linked to every anarchist assassination and student uprising that caused chaos to the established European civilization throughout the 18th and 19th centuries. Modern Americans have succumbed to the conspiracy theory label and will only listen to what the propaganda machines tell them. Now our people don't believe anyone other than maybe the Arab world "hates our freedom." Most modern Americans will never know what went wrong with their "great experiment in democracy."

While the Marxist-communitarian argument has not provided a shred of evidence to prove their utopian vision, and their synthesis does not match their own projected conclusions of world justice, we are convinced their argument does in fact substantiate our conclusion, that the entire philosophical dialectical argument is nothing but a brilliant ruse. We used to call it "a cheap parlor trick" until a responder to this page wondered how we could call it "cheap" when it's been so successful. And he was right. The dialectical arguments for human rights, social equity, and world peace and justice are a perfectly designed diversion in the defeated British Empire's Hegelian-Fabian-Metaphysical-Theosophical Monopoly game. It's the most successful con job in the history of the modern world. (For a well presented Christian overview of the con, see American Babylon: Part Five-the Triumph of the Merchants by Peter Goodgame.)

The communitarian synthesis is the final silent move in a well-designed, quietly implemented plot to re-make the world into colonies. To us it doesn't matter if there is some form of ancient religion that propels the plotters, nor does it really matter if it turns out they're aliens (as some suggest). The bottom line is the Hegelian dialectic sets up the scene for state intervention, confiscation, and redistribution in the U.S., and this is against our ENTIRE constitutional based society. The Hegelian dialectic is not a conspiracy theory because the Conspiracy Theory is a fraud. We've all been duped by global elitists who plan to take totalitarian control of all nation's people, property, and produce. Communitarian Plans exist in every corner of the world, and nobody at the local level will explain why there's no national legal avenue to withdraw from the U.N.'s "community" development plans.

(Authored by, Niki Raapana and Nordica Friedrich, 2005)


Starting to make sense now?