I never could’ve put this together in such an understandable format but here it is thanks to the magic of re~blogging. This is a long read, but it is something you must read. If for no other reason then just to understand how your govt ops work. It is sometimes like a bad car wreck, you don’t want to look but you must sneak a peek. Pay very close attention to the reference to the Fusion Center: It has everything to do with what ever in the heck is going on in Snohomish County – mark my words
I’ve cobbling this entry together between uptime and downtime over the last couple of weeks so bear with me on this one. I think there’s a fundamental misunderstanding of how counter-insurgency intelligence and exploitation systems work so I’m going to touch on them a bit in this entry. It’s by no means comprehensive as that would take an entire volume to document. So what I’m going to attempt to do here is give the reader some insight into how an insurgency is identified, exploited, and targeted using a fairly simple and brief scenario.
Make no mistake that over the last decade plus the DoD, DoJ, DHS, NSA, and CIA have definitely learned their lessons. From shortly after 9/11 when the new lessons of counter-insurgency still lay ahead to the recent (last few years) capture and killing of Al Qaeda’s top officers the concepts and techniques of counter insurgency targeting have…
View original post 2,895 more words