Poll of a Billion Monkeys

Showing posts with label military. Show all posts
Showing posts with label military. Show all posts

Monday, September 22, 2014

ARMY GOES ATHLETE

Indeed. There is a great deal of difference between static strength (as exemplified by things like push-ups) and flexible, capable, athletic capabilities as evidenced by the ability to climb, jump, pull, push, roll, etc.

The ability to climb, roll, carry, climb, hoist, and so forth are far more important capabilities to a soldier (or anyone in an occupation requiring both physical fitness and adaptable capability) than is an ability to complete a specific number of sit-ups.

I for one am very glad to see the physical emphasis shifting towards active physical capabilities in testing.


Army's Big PT Test Changes

Army's Big Pt Test Changes
For the first time in more than 20 years, the Army is gearing up to change its fitness test for every Soldier.

Gone is the simple pushup, sit up, and run routine, and in its place comes a battery of sprints, jumps and rows.

And the service is also introducing a grueling series of slalom runs, balance beam walks, casualty drags, and ammo carries it calls the Army Combat Readiness Test -- a totally new evaluation that simulates the kind of body crush Joes experience on deployment.

"The key difference is between 'readiness' and fitness," said Lt. Gen. Mark Hertling, the Army's deputy commanding general for initial training. "It's one thing to be fit it's quite another thing to be ready for the things we are being asked to do. And in our case, it's becoming a 'tactical athlete.' "

For the next six months, the Army will be administering the new Army Physical Readiness Test and the ACRT to almost 10,000 Soldiers at nearly 10 Army commands, including Fort Leonard Wood, Mo.; Fort Benning, Ga., and Fort Sill, Okla. Soldiers there will help Army fitness experts determine how best to structure the tests and how often to do them.

Army officials are also looking into how to grade the new tests, with a simple "excellent," "good" or "poor" potentially replacing a pass-fail or a point score...

Thursday, June 25, 2009

Thursday MCW Briefing - 6/25/09

Thursday MCW Briefing (Military/Crime/War)

MS-13 Indictments


The West African Coke Line

Hizballah of New Jersey

Detachment 88


NYPD Counterterrorism

Into the Abyss

Murtha Speak

The King of Korea - interesting analysis.

The Predators in Pakistan

The Just War

Fight Like You Intend to Win, Fight Like Injuns - The Iranian opposition and the people are still trying to fight this thing like it's a Marquess of Queensbury match. It ain't. When you're fighting tyrants you fight like Injuns, not like Englishmen. They need a real leader and a real revolutionary with real plans and they need him now.

Shattering the Illusion

The Strike

The Altruism of War - Although I am agnostic on this study I cannot help but tithing of both the altruistic and individual motives of protesters in Iran

Cybergon


Digg!

Save This Page

Saturday, February 10, 2007

EXPLORATORY AND EXPEDITIONARY FORCE

Signal, Sygnet, and Sigil - The Exploratory and Expeditionary Force

For those of you with military and related backgrounds, I have been working for some time now (actually this goes back to when I was in the CAP) on a Special Military sub-branch called the EXPLORATORY AND EXPEDITIONARY FORCE. I have it pretty much in order now and if you'd like to look over it and comment I'd appreciate the feedback and commentary. If you are already aware of anything like this already in operation within the US military then please let me know. And please provide information on it if you can. If you are not aware of any such military unit or paramilitary unit then please feel free to comment on it to me.

However from all of my military and Pentagon sources no-one seems to know of a unit like this, or formed under this set of mission standards. Though as has been pointed out some existing units already handle many of these separate mission functions.

The general idea is of a military sub-branch (or actually a force assimilated from all of the other branches) whose chief job is exploration and exploratory expeditions, including scientific expeditions. They would also gather Intel and make current and accurate maps of foreign cities and nations as well as exploring unexplored or little explored areas which currently exist in our world. Eventually they could be used as off-world expeditionary explorers.

This idea harkens back to the Greek, Roman, and British ideals of military and paramilitary (or in the case of the British of private explorers with military backgrounds) units who were employed as explorers, scouts, and expeditionary forces. (A good early American Example of such a force was the Lewis and Clark Expedition, which was not just a scouting force but a combined Intel operation, scientific expedition, contact/diplomatic mission, and mapping reconnaissance of the Continent, as a friend recently reminded me. So this idea is really just a return in many respects to the early American idea of a combined civilian/military joint force with multiple mission objectives and capabilities. One which is both Expeditionary, and Exploratory.) In this case I want to make it a standing and full time unit of the US military though it would be open and fluid as well, and private citizens and those from civilian agencies could join as well. Let me know what you think of the idea. You can contact me by email if you like or leave comments here.

Before I publish and promote this idea I'd like some feedback and possible suggestions for improvement.




EXPLORATORY AND EXPEDITIONARY FORCE:


Troops – Multi-Branch Corp of Seamen, Airmen, Soldiers, Marines, Guardsmen, Paramilitary, Lawmen, and Civilian Agents.

Special Forces Units: 10 Teams of 10 to 30 Men, Entire Corp not to exceed 500 men, including support personnel and officers. These Teams will be Renaissance Troops, capable in a wide range of disciplines, both military and non-military, able to function effectively as both individual agents and in small tactical units.

Assignment: Personnel and Officers would come from regular and reserve units of the other branches having shown aptitude for EE Work and having been recommended for the Force by their superior officers. Certain personnel might also be recommended by their Congressmen, Senators, or the President and might possibly come from civilian agencies, scientific organizations, cooperative corporations, law enforcement, etc. Everyone recommended and accepted would then have to undergo basic training for the Force and pass all tests and requirements, physical, mental, and psychological.

Uniforms and Appearance: Any person serving in the Force will have access to various uniforms depending upon assignment, mission, and posting. They will wear standard BDUs employing standardized camo patterns while working with governmental and civilian personnel, and with other military branches. They will have expeditionary uniforms and fatigues while on duty assignment in the field. They will wear a casual uniform similar to those worn by civilian personnel or law enforcement personnel or they will be allowed civilian clothes and dress suits when interacting with the public or while operating in foreign lands or posts.

Animal Teams: Most EE Force Units will employ specially trained animal teams that can assist with various missions.

Training (Trained in the following): Advanced All Terrain Survival Skills, Languages, Archaeology, Anthropology, Exploratory and Mapping Skills, Land/Sea/Air Navigation, Record Keeping, Engineering, Information and Intel Gathering, Espionage and Sabotage Work, Animal Handling, Conservation, Encryption/Encoding/Decryption/Decoding, Communications, Field Computing, Scouting, Reconnaissance, Surveillance, Interrogation and Interviewing, Handling and Operation of small land, sea, and aircraft, Tracking and Manhunting, Pursuit and Evasion, Search and Rescue, Advanced Field Medicine and Basic Emergency Field Surgery, Disaster Relief, basic Geology and Geography, Physics, Biology and Natural Science, Reconstruction, Cultures and Religions.

Combat Skills: Tactical and Close Combat, Sniping, Sabotage, Scouting and Recon, Counter-Insurgency, and Guerilla Warfare.

Mission Types: The types of missions undertaken by the EE Force will include, but is not necessarily limited to the following types of assignments; Exploration, Template Profile Mapping (TMP), Scouting and Reconnaissance, Surveillance, Navigation (all to include wilderness, unexplored, rural, and urban terrains), Disaster Relief, Reconstruction, Cultural Analysis, Intel, Espionage, Interpretation, Engineering, Communications, Field Computing, Archeological and Anthropological, Scientific, and Cultural/Societal Interactions.

In addition EE Force Personnel may also provide both logistical and even combat support/assistance with various other types of units and operations and missions as needed, such as; Tracking, Manhunting, Search and Rescue, Medical, Tactical Engagements, Special Forces Operations, Cryption and Coding, Interdiction, and Sabotage.

Purpose: The EE Force would exist primarily as very advanced Scouts (not just in potential combat areas, but Scouts who enter areas long before any possible hostilities, or any necessary hostilities) and as Explorers to areas of the world in which information and intelligence is very limited, and to areas of the world which are largely unexplored and unmapped by the United States. The EE Force is primarily an exploratory and expeditionary force that possesses Intel and Tactical combat support capabilities if and as needed.

© JWG, Jr. 2007

Digg!

Save This Page

Friday, February 09, 2007

Thursday MCWS Briefing 2/8/07

Thursday Military/Crime/Warfare/Security Briefing

Did Dahmer murder Walsh? - A Fascinating theory developed by cold case Detectives and an ex-FBI agent that Dahmer could have possibly killed Adam Walsh. I know for a fact that Dahmer later kept head trophies. This early murder might have been practice.
Additional Link with doubt:

L'il Kim-il - North Korean boy punk Rocks the Macau. I can hardly wait for the sequel.

A Lawman of Virtue

Bring Em In - I guess they do want the Surge. After all it's them being murdered, not American Senators.

Slaughterman - Pig Farmer, or Pig? You be the judge.











From Iraq Pictures:
Mexicans and Meth - Since Meth is primarily a rural and suburban enterprise this is an interesting phenomenon because it says that Mexican gangs are gaining both distribution control and are penetrating into areas far less urban than was the case before.

Armor for the War 0n Bear-Terror - This made me laugh. Out loud.

British Terrorism - A Police state for Muslims. They must have been randomly targeted, Little other explanation for this kind of outrageous behavior by the British authorities. Shame, shame, and unpardonable shame.

Alfonzeroed - Don't Cry for Me Argentina.

The Intel War

Thailand Insurgency


Baghdad: Day Two

New Police Chief: Female

Indictments of Five in Iraq



Thursday, January 25, 2007

Thursday MCWS Briefing 1/25/07

Thursday Military/Crime/Warfare/Security Briefing

ATF: Thefts of Explosives From State and Local Government Storage Facilities

National Virtual Translation Center - Statement from Director during Congressional Testimony.

Bureau fights Gangs in City of Angels - This is long overdue if you ask me.

US-Allied Systems Interoperability - Good Lord, how long have I and my friends bitched about this, and what should be done about it? Almost 6 years after 9/11? I'll believe it when I see it though.

Laser-Microwave Gun

Middle East Cold War - In my opinion it is far from Cold, it's been a Warm War for a long time. But this does provide an interesting analysis of the current state of affairs.

The AU in Somalia








Dulmatin Wounded








Georgian Sting - My first instinct is to link this, at least on the periphery, to the Litvinenko Case. At the time of the poisoning I remarked to an old friend of mine while discussing the case that I didn't think that Litvinenko was the sole target, he may have even been incidental, but that rather that the assassination was part of a larger plot by someone or some concern to distract and/or dismantle a Private Intelligence Network which had probably stumbled across a weapon's smuggling operation while investigating something else, like the War in Chechnya. And it seems the Russians have shut the Georgian end of the investigation down. Being the Russians they would have done this no matter what the situation but it only confirms for me at this point that I may have not been far off the mark with my original analysis. The fact that the arrest was made prior to the poisoning only makes me all the more interested in the instrumentality of the Litvinenko killing as it relates to this type of smuggling operation, the methods employed, sourcing, and the delivery chain/route.

Civilian Corp - It's not really a new idea, my friends and I have kicked around this for a long time, not just with the military but with Law Enforcement. A long time ago I called the idea the Vigilants. But it doesn't matter the variety of nomenclature, I'm just awfully glad to see this kind of idea being discussed openly.

Seale Finally Sealed - Having worked quite a few Cold Cases myself I know that the feeling can be quite satisfying when you reel one in, especially after this much time has passed. But as I was discussing with a friend the other day, "The only real Justice is prevention, everything else is just playing catch-up." Better if this could have been anticipated and prevented, rather than resolved 43 years later. I wish Law Enforcement put as much effort into Crime Anticipation and Prevention, or Counter-Criminality, as the military puts resources into Counter-Terrorism.

Cryptographic Advance - I was reading this White Paper when the possibilities for a new form of cryptographic espionage technique occurred to me. The Steganographic implications are also quite staggering because it means that steganographic images used to transmit secure data could not only be made entirely unique with every image, but that image could potentially shift according to any number of factors, such as time of day, interception device, reading device, source identity, receipt identity, interpolation marks - the applications are practically limitless.

Advanced Global Name Recognition

Hacking High Definition DVD Players


Summary of Update: Amber Alert

Changes were made to the following sections: Incident Information

Incident Information: Evergreen, MT Last seen on Wednesday, January 24th at 7:00PM

Incident Summary: Subject missing from relatives residence on Maple Drive, Evergreen, Montana, Flathead County. Subject was outside residence awaiting parent. Parent went inside momentarily and when returned child was missing.Search commenced soon after and is ongoing

Victim Information:
Victim 1Loic Rogers, White Male, 3 Years Old, 3 feet 0 inches tall, 40lbs., Blonde hair, Blue eyes,.Additional information: Clothing description: Last seen wearing red, white and blue jacket, blue jeans, yellow,green and orange beanie hat, tan leather boots.

Contact Information:Anyone with information is asked to call 911 immediately. You can also call the MT Control Terminal - Justice Help Desk at 1877ambermt or toll free at 1877ambermtor visit http://www.montanaamberalert.com/

Recommended Text Page Message for Internal Broadcast:AMBER Alert Update Loic Rogers in Evergreen MT plate number: More @ montanaamberalert.com

Recommended Voice Message:MT Control Terminal - Justice Help Desk is looking for Loic Rogers.The event occurred at , Evergreen MT on Wednesday, January 24th at 7:00PM.Subject missing from relatives residence on Maple Drive, Evergreen, Montana, Flathead County. Subject was outside residence awaiting parent. Parent went inside momentarily and when returned child was missing.Search commenced soon after and is ongoingVictim 1, Loic Rogers is described as being a 3 year old White male, Blonde hair, Blue eyes, 3'0 40lbs Wearing: Last seen wearing red, white and blue jacket, blue jeans, yellow,green and orange beanie hat, tan leather boots.If you have any information on this incident, please call 911 or contact the MT Control Terminal - Justice Help Desk at 1877ambermt.

For additional information about the victim(s), suspect(s) or vehicle(s) visit http://www.montanaamberalert.com/


Digg!

Save This Page

Thursday, January 18, 2007

Thursday MCWS Briefing 1/18/07

Thursday Military/Crime/Warfare/Security Briefing

Murder and Gang Initiatives

Chinese Satellite Killer - China continues to develop some major new high-tech warfare capabilities. I found this one particularly interesting. What the US will be forced to do eventually is develop countermeasures and perhaps satellite defensive capabilities. Unlike the Soviet Union however, a nation that was crippled by her own lack of economic vision and capability, the Chinese communists understand all too well the very vital and potent link between economic capacity and prosperity and military capability and power.

The Assassin Email

The Digitized Camo - The very first time I saw this design the very first thing I was reminded of was pixilated white noise off of my digital camera screen. I thought the idea absolutely brilliant at first for a static design through which no energy flowed. Fixing on such a camo-ed target at a distance it struck me that perhaps it would cause "fuzz" or distortion which might make the target seem slightly askew of, or displaced from his real position and therefore a more difficult target for snipers to fix upon as just one example. Now I realize after having studied the design for some time that what is actually needed is a design which is energized to create true distortion. Here is an article about troop satisfaction and dissatisfaction in the field with the new camo.

When Good Ideas Smell Bad - This is just the Dick in me I'm sure but something smells all wrong about this, at least at this point in time. Yes, I agree it is a necessary step. It also feels all wrong. I think the flow should be carefully controlled and grandfathered depending upon performance and capability. I got a very bad feeling about just flooding most military and especially police units with more weaponry. This needs to be tracked carefully because Iraq is still Frontier's Law and a Frontier's Combat Zone. My blue sense starts tingling when I think about wide scale weapon dispersements to people and units we may or may not be able to control, or who may or may not remain future allies. I would not have flooded the streets of Berlin with new weapons after World War II to control Nazi insurgents. Not till I was sure the Germans had made the turn-around.

Border Agents Surrender to US Marshals



I don't Know Whether to Laugh, or Cry - Do we really want people like this serving, and who would want to be serving beside them if they were deployed?

Gonna BB an Idiot - Let's just say that it doesn't surprise me.

Bangladesh Crackdown

Last Stand



US Industrial Espionage and Intel

Digg!

Save This Page

Thursday, January 11, 2007

Thursday MCWS Briefing 1/11/07

Thursday Military/Crime/Warfare/Security Briefing

Iraq
______________________________________________________________________________________________
Text of President's Speech on Iraq

Some Military Details of the President's Plan - I will be commenting later today on some of the military details of the plan.

Plan Bullet Points

“The controversy over what to do about Iraq has congealed into two camps: supporters of the President who lack a clear plan for achieving victory, and critics of the President who have a detailed plan for America’s defeat.”

Loren Thompson

_______________________________________________________________________________________________

Other News

Helping A Milblogger/Logroller - Help out if you can. He's been through a lot.

92,000 Boost - To me the number seems low. I guess it will depend upon the actual percentage of combat able troops.

Damned, and either way - How right you are.

Elliot Ness - I've always wondered about his direct, or indirect relationship with Federal authorities. A very interesting story.

Bureau Records Declassification

Children Strangled - The method of murder bothers me because of what it implies.

White Pickup - Concerning the seeming kidnapping case.

ASEAN and Myanmar




Kenya detains Somali Al Qaeda Wives - I wish I could get a truly straight, final story on this. Not about the wives, but the Al Qaeda leaders.








Wednesday, January 10, 2007

Troop Surge

Signal, Sygnet, and Sigil - Troop Surge

This post by Blackfive on Blackfive should be required reading on the Troop Surge and winning in Iraq.

Go and Check it out.
Immediately if not sooner.

The Surge of Information

Digg!

Save This Page

Friday, January 05, 2007

Thursday MCWS Briefing 1/4/07

Thursday Military/Crime/Warfare/Security Briefing

US Border War - What we really need is deep infiltration and penetration of these groups on the other side of the Border. I'm for offensive action against ICCs, border gangs, and terrorists along the border.

INDC Embed - We need far more of this kind of thing. We also need far more of our own local embeds from the local population in various parts of the world; Iraq, Afghanistan, Sudan, Somalia, etc.

The New Ford - It seems extremely fitting to me. Now he's not a Lincoln, he's an Air Craft Carrier.

Realizing Anti-Qaeda

No New Leads in New Year's Eve - I'm with Agam. If it smells like a dead fish, it probably is.

David and Goliath

Intelligence Beyond - Boy, have I been saying this for years.

SIGINT's Clean Sweep - Funny, I hadn't really thought of this in this context till now.

Help Track Fugitive Domestic Terrorists


Digg!

Save This Page

Friday, December 29, 2006

A Couple

Pesharim - A Couple

Got this from Laughing Wolf at Blackfive.

Milblogger Down

Walter Reed

It deserves to be checked out.
Thanks to everyone who assisted with Valour-IT.


Also, there's this bit of bad news.

Submarine Crew killed in Accident


Digg!

Save This Page

Thursday, December 14, 2006

Conventional approaches to unconventional problems: Analyzing terrorism

Signal, Sygnet, and Sigil - Conventional approaches to unconventional problems: Analyzing terrorism


Digg!


I'm looking for new writers and contributors for both The
Missal
and the B-Reader.

This is an article written by a friend of mine for the MIPB.

It is an older article but is still applicable
and valuable.

He requested I post it. I am setting it up so that he may post
independently in the future.

Del has had a wide and varied military
career, especially as regards Intelligence and Analysis. He is also a very good
writer.

It is my hope that Del will become a more or less regular
contributor to the Missal when he has the time, and that in the future he
will become a contributor to the B-Reader as well.

Since
today is MCW Day at the Missal I thought this would be
the perfect time to post Del's first article.

Enjoy.


Conventional approaches to unconventional problems: Analyzing terrorism
Military Intelligence Professional Bulletin, Jan-March, 2002 by Del Erin Stewart

Considering the implications of the 11 September 2001 attack on the United States, many changes must occur in how the U.S. Army conducts its counterterrorist operations. New methodologies and tactics, techniques, and procedures (TTP) must emerge if the Army is to address this new threat. Based on experience, the following methodology is one possible interim fix.

The theory is simple: if you know your enemy's capabilities, vulnerabilities, methods, and thought processes, you are more likely to successfully predict when, where, and how he will attack and be able to plan countermeasures. While we used the following methodology experimentally at an analytical cell at a numbered Army level, the tools and techniques discussed below may be useful for other echelons.

When predicting traditional or conventional military threats, the U.S. Army employs analytical methodologies such as intelligence preparation of the battlefield (IPB) and related tools. The terrorist threat, however, is unique in that its nature and survival require it avoid direct engagements with main force units. Terrorists are exceedingly mobile, have mastered the art of blending into the surrounding population, and employ harsh measures to ensure security.
On the other hand, our national collection assets provide so much diverse information that making sense of it all is a daunting task. Reports on terrorist activity originate from all intelligence disciplines, to include open source. The information that surfaces is usually of limited scope, fragmented, and can address anything from financial issues to those focused on training or operations. Currently approved doctrinal symbols do not reflect terrorist operations types of data, nor is there generally a doctrinal method for graphically portraying such activities. The question is, then, how can an analyst take the disparate, seemingly unrelated data points, and move forward toward accurate predictive analysis? One thing is certain: the effort will involve all intelligence disciplines.

We rethought and revisited these methodologies because the commander was very unhappy with detailed, multicolored charted and graphed after-the-fact analysis; he wanted reasonably accurate predictions to help in his decision-making process for recommending countermeasures. First, it is useful to look at existing tools and methodologies for analysis, then additional areas of focus, and recommending countermeasures.


Existing Analytical Methodologies Applied Against Terrorist Operations

The following analytical tool descriptions and examples are from FM 34-60, Counterintelligence, Section VI, Counter-Human Intelligence Analysis, to Appendix A, Counter-Human Intelligence Techniques and Procedures. We modified the wording slightly for ease of use in this forum. This section discusses a chronological record and three analytical techniques.

Time-Event Charting. The time-event chart shown in Figure 1 is a chronological record of individual or group activities designed to store and display large amounts of information in as little space as possible. This tool is easy to prepare, understand, and use. Symbols used in time-event charting are very simple. Analysts use triangles to show the beginning and end of the chart and to show shifts in methods of operation or changes in ideology. Rectangles or diamonds indicate significant events or activities.

Analysts can highlight particularly noteworthy or important events by drawing an "X" through the event symbol (rectangle or diamond). Each of these symbols contains a chronological number (event number), date (day, month, and year of event), and may contain a file reference number. The incident description is a very brief explanation of the incident, and may include the team size, type of incident or activity, place and method of operation, and duration of incident. Arrows indicate time flow.

Analysts also use a variety of symbols, such as parallelograms, pentagons, and others, to depict different types of events and activities. Using these symbols and brief descriptions, an analyst can analyze the group's activities, transitions, trends, and operational patterns. Time-event charts are excellent briefing aids as well as flexible analytical tools.

Association Matrix. The association matrix delineates the existence of relationships between individuals. The part of the problem deserving the most analytical effort is the group itself. Analysts examine the group's elements (members) and their relationships with other members, other groups and associated entities, and related events. Analysts can show the connections between critical players in any event or activity in an association matrix (see Figure 2), which shows associations within a group or similar activity, and is based on the assumption that people involved in a collective activity know one another.

The construction of this type of matrix is in the form of a right triangle, and analysts list personalities in exactly the same order along both the rows and columns to ensure that all possible associations appear correctly. The purpose of the personality matrix is to show who knows whom. Analysts determine a known association by "direct contact" between individuals; a number of factors determine direct contact, including face-to-face meetings, confirmed telephonic conversation between known parties, and all the members of a particular organizational cell.

Analysts indicate a known association between individuals on the matrix by a dot or filled-in circle. They consider suspected or "weak" associations between persons of interest to be associations that are possible or even probable, but they cannot confirm it using the above criteria. When a person of interest dies, a diamond next to his or her name on the matrix relays that fact.

Activities Matrix. The activities matrix helps to determine connectivity between individuals and any organization, event, entity, address, activity, or anything other than persons. Unlike the association matrix, the construction of the activity matrix is in the form of a square or a rectangle (see Figure 3). The analyst can tailor rows or columns to fit the needs of the situation at hand or add them later as the situation develops. The analyst determines the number of rows and columns by the needs of the problem and by the amount of information available.
Analysts normally construct this matrix with personalities arranged in a vertical listing on the left side of the matrix and activities, organizations, events, addresses, or any other common denominators arranged along the bottom of the matrix. This matrix can store an incredible amount of information about a particular organization or group, and can expand on the information developed in the association matrix.

Link Diagram. The third analytical technique is link diagramming. Analysts use this technique to depict the more complex linkages between a large number of entities, and can include persons, organizations, or almost anything else. Analysts use link analysis in a variety of complex investigative efforts including criminal and terrorist investigations, analysis, and even medical research. Several regional law enforcement training centers are currently teaching this method as a technique in combating organized crime. The particular method discussed here is an adaptation especially useful in counterintelligence (CI) investigative analysis in general and terrorism analysis in particular.

In link analysis, a number of different symbols identify various items. Analysts can easily and clearly display obstacles, indirect routes or connections, and suspected connections. In many cases, the viewer can work with and understand the picture more easily than the matrix. Link analysis can present information in a manner that ensures clarity.

As with construction of association matrices, analysts should follow certain rules of graphics, symbology, and construction. Standardization is critical to ensure that everyone constructing, using, or reading a link diagram understands exactly what the diagram depicts. The standard rules follow:

* Show persons as open circles with the name written inside the circle.
* Show person known by more than one name (alias, also known as [AKA]) as overlapping circles with names in each circle.
* Show deceased persons with a diamond next to the circle that represents that person.
* Show nonpersonal entities (organizations, governments, events, locations) by squares or rectangles.
* Show linkages or associations by lines: solid for confirmed and dotted for suspected.
* Show each person or other entity only once in a link diagram.


Complementary Methodology Developed

The approach used to meet the commander's intent for predictive analysis was to use traditional IPB-style graphic overlays, but then modify this methodology to specifically monitor the actions of a terrorist group and its associated elements. The use of overlays on training, organizations, finances, and warnings can be effective.

Training. The first overlay (Training) may contain all the available information on training camps and locations, by country, which this organization and its associated elements reportedly use. This data will primarily come from imagery intelligence (IMINT), human intelligence (HUMINT), and signals intelligence (SIGINT). There is utility in knowing what topics specific camps train, and recognizing changes in what they are teaching or training. As an example, if a camp that traditionally worked on the use of RPGs (Soviet antitank grenade launchers) and small arms suddenly changes to one of hostage taking, analysts would note this radical change as a possible alteration in organizational objectives. Certainly it would be a key indicator.

Organizations. The second overlay (Organizations) may contain all of the available information on non-governmental organizations (NGOs) and subordinate or related elements (e.g., branch offices of the same organization, but in a different country). That overlay depicts known and suspected relationships between NGOs (especially those that Were essentially front organizations) and the terrorist groups. As appropriate, analysts can include other organizations. Information allowing completion of this overlay will mainly come from reports issued by HUMINT, Cl, and SIGINT sources. Knowing what surrogates are available is essential to understanding the extent of the potential threat. For example, a legitimate mining operation may have second- or third-hand ties to a terrorist group, which could mean that industrial-grade explosives might be available for the group to use in future attacks.
Note: A crucial consideration in evaluating this data is to ensure compliance with intelligence oversight requirements, and not store or depict any data that violates AR 381-10, U.S. Army intelligence Activities, Executive Order 12333, United States Intelligence Activities, and related regulatory requirements.

Finances. The third overlay (Finances) depicts information available on finances, business transactions, assets, and related issues. Nearly everything costs money and, as the maxim states, "follow the money." The money trail leads through organizations to people and equipment, which in turn helps provide an understanding of the terrorist's objectives and capabilities. Of particular importance are reports pertaining to the transfer of funds for training, either directly or via NGO surrogates. Again, this will come mostly from HUMINT and SIGINT sources as well as foreign and domestic law enforcement agencies and other interagency reporting.

Personalities. The fourth overlay (Personalities) depicts the current location of essential personnel within the terrorist organizations. These reports will at least include SIGINT, HUMINT, and some measurement and signature intelligence (MASINT) and IMINT (e.g., a photograph or a sensor confirmed that a vehicle was at a particular site at a specific time). When looking at the movement of individuals, analysts should ask "Why?" All movement is risky; someone can blow a person's cover and interdict vehicles, so why is he taking this risk? Such risktaking can be an indicator in itself, while answering the question of "why?" may lead to other issues and concerns.

Warnings. The fifth overlay (Warnings) shows where (by country) national agencies issued warnings and advisories, where previous attacks occurred (if the security posture allowed one attack to occur, will others follow?) and where authorities thwarted attacks because the adversaries clearly intended something. These interdictions could include confiscation of arms shipments. The warning reports originate from all intelligence disciplines and may include law enforcement and other interagency information.

Convergence. Analysts may create additional overlays as needed. Because there are no doctrinal symbols for most of these overlays, analysts will have to create their own symbols, and post a legend to define them. Flexibility is paramount to success. Similar to chess masters, analysts look for convergent lines to indicate the possibility of attack. Despite the adversary's ability to project into areas where they have not previously conducted an attack, normally there are indicators graphically depicted in two or more areas, (for example, to show movement of important personalities, supplies, and funds).

The current doctrinal analytical tools discussed above work well to explain how something happened. The critical point, however, is to go beyond the stage of describing history to the essential point of predicting when, where, and how the adversaries will strike next. Getting there requires personal skill, time, experience, and dedication. Additionally, it will require analysts possessing access to all levels of reporting and analysts from different disciplines who focus exclusively on this form of analysis.


Other Considerations

Open-Source Data. Regarding open-source reporting, the Foreign Broadcast Information Service (FBIS) and Cable News Network (CNN) provide some of the most readily accessible and timely reporting in the world. Terrorists have been using propaganda, media manipulation, and other similar aspects of information operations for a long time, as the requirement to gain popular support is crucial to their success. Terrorist organizations need to "get the word out" to legitimize their operations, actions, and positions. The trained, experienced analyst can exploit this fact. For example, if a respected terrorist leader were to say something like, "In the course of jihad, many innocents may have to be sacrificed for the greater good of the will of Allah." That could portend an attack where mass casualties might occur, and it might also mean that the attack might occur in an area where Islam is a dominant religion.

An experienced analyst will consider numerous aspects including-
* Timing of the pronouncement (Is it a significant date, by either the solar or lunar calendars?)
* Location. (Is this a culturally or religiously significant site that issued the pronouncement?)
* Important personalities who were present (which may indicate support for the pronouncement, an end to differences between the groups, etc.).
* Other factors.

There may be other similar cues in other public pronouncements, some of them web-based instead of traditional newspaper and radio media. Just tracking the public pronouncements and postings, looking at them in detail, cross-referencing the announcements with other data, and so forth, is a full-time job-which means dedicating analysts to monitor these sites. There is a difference between the "normal" rhetoric and something that, in symbolic context, is genuinely a potential indicator. Again, deciphering these cues requires analysts who have the requisite experience and training, so that the terrorism analysis section does not begin to suffer from the "chicken little" syndrome in the eyes of the senior intelligence officer and the commander.
Visual Cues. Graphic aids are nothing more than visual cues to check the report details, develop requests for further information, and study the matter in greater detail. No system or software can begin to deal with these complex issues. The group synergy and crosstalk derived from experts in different disciplines looking at the same data is what makes or breaks this effort. Additionally, having "broken the code" on what the adversary might be planning is, in itself, insufficient; the analyst must pass data to the affected elements. Normally, at the commander and senior intelligence officer levels, this transmission will be via secure videoteleconference or similar methods. Behind the scenes, analysts often highlight a specific set of messages for one another in daily secure E-mail crosstalk. Because the amount of reporting is so great, each echelon has its own set of filters for sorting through the messages. When dealing with more than one thousand messages a day, it is easy for someone to leave out or overl ook something inadvertently. Cooperation is fundamental to success.

Because the level of detail required involves individuals, and may include single individuals to squad-sized elements (as employed in the 11 September 2001 attacks), there is absolutely no utility in developing traditional decision-support templates or similar tools. However, depending on circumstances, location, echelon, and other considerations, there may be utility in devising specific activity-based templates for depicting possible courses of action, etc. Being in the loop for the daily data feed exceeding one thousand messages a day is an all-consuming business. In my experience, the graphics aid was an effective cue for conducting deeper analysis for converging lines.

When using the IPB-style graphics overlays, not only can this be a successful methodology, it also has the additional advantage of serving as a briefing aid. Words alone, and reams of reports alone, can be confusing. Today's senior intelligence officers are accustomed to acquiring data in visual icon form. The methodology described herein lent itself to transitioning instantly from conducting analysis to briefing that analysis in a manner in which the G2 was accustomed.


Countermeasures

The final step is recommending countermeasures. It is easy to develop a siege mentality, such as that which existed throughout U.S. Army elements stationed in the Middle East after the bombings of the Office of the Program Manager, Saudi Arabian National Guard (Riyadh) in 1995, and the Khobar Towers (Dhahran in 1996) in Saudi Arabia. However, when everything is always on "high alert," it defeats the purpose of the heightened alert status. Instead of temporarily raising defense levels, the defense level remained at threat condition (THREATCON) Delta (now called force protection condition or FPCON) for a prolonged period.

Such a prolonged state of high alert had at the minimum the following effects:

* Left open the potential for complacency.
* Created a state where a new (stable) pattern nullified the intent of thwarting hostile surveillance efforts.
* Negatively impacted the local economy.

Consider the fact that when U.S. forces no longer engage in or stimulate a local economy, the merchants (and their families, associates, etc.) have no further economic incentive to having U.S. forces present. What may then develop is a general attitude that is at best ambivalent towards U.S. forces; for if there is no perceived benefit for the presence of U.S. forces, then it is a short move towards resentment of the U.S. presence. Once popular sentiment opposes the presence of U.S. forces, it is difficult to regain good will. From an intelligence perspective, it is useful to keep these economic considerations in mind when evaluating the threat, the enemy's ability to blend in with the local populace (will they be reported for suspicious activity), and related factors.

The fear that "something might happen" was so great in the Middle East after the 1996 Khobar Towers attack that Army intelligence and CI elements sometimes found it difficult to leave the compound and perform their missions. In fact, at least one G2 proposed taking all of his intelligence collectors and agents and incorporating them into the analysis cell! Analysts, however, will have nothing to analyze if the collectors do not collect. To be effective, intelligence and CI assets need to leave the compounds, and commanders must provide them with the necessary freedom of movement as prescribed in AR 381-20, U.S. Army Counterintelligence. Risk management must not become risk avoidance. Defensive postures and countermeasures must change appropriate to the threat.


Final Thoughts

The options and techniques detailed above are not radical. Our fundamental analytical methodologies are adequate to deal with this unconventional threat, with only minor adjustments; if we grant ourselves some flexibility, current doctrine will suffice. The critical principle of translating intelligence into viable options and recommendations for the commander to evaluate and implement remains unchanged.


Chief Warrant Officer Del Stewart is currently serving as a Training Senior Writer, Doctrine Division, Directorate of Combat Developments, U.S. Army Intelligence Center and Fort Huachuca. Excluding his 12 years of enlisted experience, some of his assignments have included the 102d MI Battalion, Korea; Chief, Counter-terrorism Analysis Section, 3d U.S. Army, Fort McPherson, Georgia; and the 501st MI Battalion, Dexheim, Germany (with 11 months in Bosnia supporting IFOR as the OCE Chief for 1st Brigade Combat Team, 1st Armored Division).

Good Men on Earth to Guard the Peace

From the Frontiers: Good Men on Earth to Guard the Peace


Digg!


This was sent to me by my nephew who is currently stationed somewhere in Asia. He requested that I forward it and so I thought here would be as good a place as any to do so.

My nephew is young and strong and a very fine young man but this is his very first duty station, he is very far from home and I know that on occasion he and his new wife get homesick.

So on this Holiday Season, and this Christmas remember all of those who stand along the Frontiers of this world, seeking to guard liberty, defend the innocent, protect the children, and bring peace and order to a world that would often rather bathe itself in blood than drink to brotherhood and love of fellow man.

My nephew, as so many of my friends and family have done, has chosen a life which can sometimes be wearying, exhausting, lonely and cold. At at other times can be amazing, fascinating, and deep.

But, nevertheless, they also do their job to, and for, the benefit of others.
Meaning many of you who are reading this now.

Take a moment to remember them, on the frontiers, in far away lands, doing what American Soldiers, Sailors, Airmen, and Marines do best, guard others. Remember them, and if you can, help them in some way, send a gift, or a card, or a thank you letter. They deserve it.

And pray for my nephew Sean.

Peace on Earth, and Good Will to Men, and when this is not possible because some men are corrupt and bloodthirsty, then at least Good Men on Earth to Guard the Peace for everyone else.



I HAD COME DOWN THE CHIMNEY WITH PRESENTS TO GIVE,
AND TO SEE JUST WHO IN THIS HOME DID LIVE.
I LOOKED ALL ABOUT, A STRANGE SIGHT I DID SEE,
NO TINSEL, NO PRESENTS, NOT EVEN A TREE.

NO STOCKING BY MANTLE, JUST BOOTS FILLED WITH SAND,
ON THE WALL HUNG PICTURES OF FAR DISTANT LANDS.
WITH MEDALS AND BADGES, AWARDS OF ALL KINDS,
A SOBER THOUGHT CAME THROUGH MY MIND.

FOR THIS HOUSE WAS DIFFERENT, IT WAS DARK AND DREARY,
I FOUND THE HOME OF A SOLDIER, ONCE I COULD SEE CLEARLY.
THE SOLDIER LAY SLEEPING, SILENT, ALONE,
CURLED UP ON THE FLOOR IN THIS ONE BEDROOM HOME.

THE FACE WAS SO GENTLE, THE ROOM IN SUCH DISORDER,
NOT HOW I PICTURED A UNITED STATES SOLDIER.
WAS THIS THE HERO OF WHOM I 'D JUST READ?
CURLED UP ON A PONCHO, THE FLOOR FOR A BED?

I REALIZED THE FAMILIES THAT I SAW THIS NIGHT,
OWED THEIR LIVES TO THESE SOLDIERS WHO WERE WILLING TO FIGHT.
SOON ROUND THE WORLD THE CHILDREN WOULD PLAY,
AND GROWNUPS WOULD CELEBRATE A BRIGHT CHRISTMAS DAY.

THEY ALL ENJOYED FREEDOM EACH MONTH OF THE YEAR,
BECAUSE OF THE SOLDIERS, LIKE THE ONE LYING HERE.
I COULDN'T HELP WONDER HOW MANY LAY ALONE,
ON A COLD CHRISTMAS EVE IN A LAND FAR FROM HOME.

THE VERY THOUGHT BROUGHT A TEAR TO MY EYE,
I DROPPED TO MY KNEES AND STARTED TO CRY.
THE SOLDIER AWAKENED AND I HEARD A ROUGH VOICE,
"SANTA DON'T CRY, THIS LIFE IS MY CHOICE";
I FIGHT FOR FREEDOM, I DON'T ASK FOR MORE,
MY LIFE IS MY GOD, MY COUNTRY, MY HOME."
THE SOLDIER ROLLED OVER AND DRIFTED TO SLEEP,
I COULDN'T CONTROL IT, I CONTINUED TO WEEP.

I KEPT WATCH FOR HOURS, SO SILENT AND STILL
AND WE BOTH SHIVERED FROM THE COLD NIGHT'S CHILL.
I DIDN'T WANT TO LEAVE ON THAT COLD, DARK, NIGHT,
THIS GUARDIAN OF HONOR SO WILLING TO FIGHT.

THEN THE SOLDIER ROLLED OVER,WITH A VOICE SOFT AND PURE,
WHISPERED, "CARRY ON SANTA, IT'S CHRISTMAS DAY, ALL IS SECURE."
ONE LOOK AT MY WATCH, AND I KNEW HE WAS RIGHT.
"MERRY CHRISTMAS MY FRIEND, AND TO ALL A GOOD NIGHT."

Thursday MCW Briefing 12/14/06

Thursday MCW Briefing

Posthumous Award

Scam Warning

FBI Award to Italian Policeman

Military Charities

Space Hackers

Quality Dropout?

Tears of Joy

Hunting Nuke Cargo

Took Awhile

Multi-Generational Conflict

Wednesday, December 06, 2006

Victory As a Code Word

The Glair - Victory As a Code Word


Digg!


Today, at lunch, I watched the press conference given by the Iraq Study Group to a gaggle of reporters gathered for this momentous event. The only trouble was, nothing momentous occurred.

Yes, some interesting political and military recommendations were made, most of which have been made previously by others, and frankly in far better overall form and format. Yes, the group presented some really interesting psychological ideas and concepts regarding the important benefits of national unity during a time of war. But is this not a rather self-obvious conclusion, if any reasonable person reflects upon the idea for about three milliseconds?

The group also deftly and brilliantly grasped the fundamental conclusion that if the Iraqis fail to act then eventually we can't win their liberty for them. That in the end the Iraqis must decide that their liberties will outweigh their oppression and fear and so decide decisively to fight the good fight by their own measure and on their own turf. But is this a conclusion that either we, or the Iraqis, needed to wait for this group to sanction before understanding the basic theme for ourselves? Then the Justice promoted the idea that she hoped the media would do their part to correctly and fairly present the President's goals and aspirations for success in Iraq to the American Public. Is this a recommendation of the pragmatic assurance of the triumph of Realism in domestic affairs, and if so, can one say with any certainty that Realism is a more, or less, likely method of conducting successful foreign policy than what we now currently enjoy?

I was also extremely gratified to see that the group steered clear of "code-words" like Victory. You want to stick to what you know and since so many of the panel members seem to have reached the conclusion that Victory is a perniciously difficult code word, no sense in attempting to Break the Code. Codes are not meant to be broken anymore, with parturient work and cunning cleverness, as was the case when our forefathers broke the codes for victory in the Revolution, or the Civil War, or World War II. Just admit that the very idea of code breaking in this case sounds a lot like much ado about nothing and it's best to just say, "we'll skip the term for now and return to that if events leading to a Victory ever overrun our recommendations." Victory is no longer an achievable goal, it is a force beyond our ability to control which eventually, if we are lucky, over-runs us like a mysterious demonic force or some unknown pathogenic agent. In short we have redefined victory as the Ghost of a Machine we cannot control, of which we are but one lonely cog, which will never understand anything other than our own liabilities and the ping of the gears as they work around us. The modern mind at work, the modern man as self-defined: he is pinged by his circumstances, but never master thereof.

America has given birth to a whole class of people, most highly urbanized and intellectually highly Europeonized, who have simply expelled and expunged certain terminology forever from both their personal and public vocabularies. Words, once very ordinary and basic words, like Victory, Adaptability, Overcoming, Strength, Sacrifice, Heroism, Principles, and Ideals have been replaced with more sophisticated sounding and no doubt sophistical terms like Success, Prudence, Consensus, Footprint, Structure, Reduction, Redeployment, and Realism.

Nobody likes this war, wars aren't supposed to be liked. Why that is so hard for the modern American mind to grasp is probably due to the fact of wide-scale public school education in matters of history and culture, but be that as it may wars are not supposed to be liked by either those fighting the wars, or the general public at large, they are supposed to be won. Not realigned, redeployed, re-regulated or regurgitated as tidy policy summations. You adapt in war, you do not accommodate. In any war anyone undertakes in life, whether it is national or local or even personal you are presented with a number of choices and options in the manner by which you conduct and execute that war. But eventually every single choice and option narrows to two inevitable conclusions. Win, or Lose. Self-Surrender is a loss in kind as surely as having your ass handed to you by the enemy because he has simply fought harder and longer and more successfully, and thereby overwhelmed you. That's not sophistry of the modern kind, or even the ancient Greek kind, that's Realism of the Universal Kind. It's the way it has always been and always will be.

I've got absolutely nothing against the Iraq Study Group or most of their recommendations. But to leave out the very idea of Victory is to leave out the meat from the chili, the engine from the automobile, the feathers from the eagle. Might as well eat air, drive a Pinto, or fly on the back of a turkey for all of the good those methods will do you. A concession on the idea of Victory is to practically and pragmatically admit by exclusion that Victory was never your intent and that you currently have no fundamental understanding of the term, and therefore probably never did. You fight to the very end, the end of what it takes to win, or you lose. Recast that in any light you wish, even ultraviolet or infrared, and a spade is still a spade and a flush still beats a pair of clever redefinitions.

Men, organizations, institutions, and nations are ultimately known by two things; what they say and what they do. In the case of Action - Work must follow Word. In the case of Words, the Employment must dictate the Exploit. Is there an honest and thinking man or woman among us, who, being willing to strip away the meaningless babble of misdefined terminology can find either Exploit or Victory in the code words of this report? Indeed, what does this report actually report and what does this study studiously suggest?

Commitment by Committee? Victory by Verisimilitude? Success by Superficiality? Realism by Recommendation?

If that's all your recommending esteemed ladies and gentlemen then please return and speak to us again when you actually have something worth suggesting in language that actually sports a real and achievable objective. Otherwise, and let me put this in terms you can understand, "your code is flawed."

© JWG, Jr. 2006


Excerpts of Iraq Study Group report

Tuesday, November 07, 2006

Samsung's Patrolbot

Signal, Sygnet, and Sigil - Samsung's Patrolbot

An interesting article, video, and discussion on Dean's World about a new robotic defense system in South Korea.

SISGR

Monday, November 06, 2006

New Weapon Plot

Signal, Sygnet and Sigil - New Weapon Plot


Digg!

As many of you know I have for a long time been tracking crimino and narco terrorist efforts to smuggle weapons and contraband for the execution of attempted operations in various parts of the world. This article deals with a recent attempt by terrorist cells to produce a workable operation involving thermobaric and related explosive devices in Britain.

What is of especial interest to me personally is the public reporting of the IRA and FARC working in collaboration in order to attempt the manufacture of a fuel air explosive, and the refinement and distribution of the accompanying chemical formula.

As many of my other readers also know IRA agents have freelanced for a long time in teaching Palestinian and Arab terrorists better and more effective methods for the construction of homicide vests and other personal anti-personnel and anti-civilian weaponry.

An operational and practically deployable thermobaric weapon, perhaps combined with secondary chemical agents (assuming such agents could survive the enveloping thermal cloud) or combined with secondary chemical agents and explosives used against first responders would make a formidable multi-stage or multi-attack weapon system for the arsenals of various terrorist groups.

Such weapons would not even have to be deployed often, as, having once been demonstrated effective by a successful public operation, they could then be used as weapons of extortion.

Additionally multiple weapons of this type, deployed strategically in a small area could potentially have an effect similar to, if not greater than, the Oklahoma City Bombing, as evidenced by the attempted Gas Limos Project.

Defense Tech Article:

Terrorists Planned Fuel-Air Attack

Friday, November 03, 2006

All At Once

Pesharim - All At Once

1. The Cloud of Autumn Operation has begun.

It seems extremely coincidental the roof of the mosque would collapse only after the gunmen had fled. The use, by the militants of a large group of female human shields seems to be a fairly new tactic in group and guerrilla skirmishes. I suspect that we will see more of this type of public call/rapid response/civilian shield tactic. As a regrouping, delaying and escape maneuver it was quite effective. The next step of course will be to employ Child Shield brigades as well as combined Women-Child Shield Brigades.


2. This is going to be interesting to follow: Ted Haggard
It is difficult for me to imagine how he could admit to some guilt in the matter and yet deny having a homosexual relationship. I guess it depends upon how one defines a "relationship."
Of course It is always possible that he intended to engage in homosexual relations but never actually wen through with it, that it was all talk. We'll see as he seems willing to admit his guilt at least to a degree.


3. Considering the large number of separate and often competitive governmental and sub-governmental and paramiligovernmental agencies and organizations operating within Iran (the "Islamic Republic" has no aversion at all to imitating the West in developing a complex set of competitive agencies and entities within its governmental structure) this is a dangerous development indeed. A single missile penetrating our Aegis defenses and you have considerable damage to a US or allied vessel, as well as the necessary conditions for at the very least a regional naval war. Iranian Antiship Missiles.

What worries me more is that Iran now possesses enough offensive naval might to make any blockade more than problematic and to assist narco and criminoterrorists and smugglers with their transport and smuggling operations.

I can also see contract smugglers and terrorist cells as well as rogue powers like North Korea seeking to buy Iranian naval escorts to attempt to circumvent or disrupt naval blockades and interdictions.

It is no coincidence that the operation is called Great Prophet 2. They see these developments as part of their overall strategy to provoke regional conflict and evoke the Mahdi.


4. Price Wars: This will be good for the overall economy and should be a boon for the consumer. It should shorten inventories a bit as well.


5. Can Microsoft and Novell do together what neither has ever been able to do separately. Destroy Linux by supporting it?


6. No Duff. See me here: Cell Wars