Page 6 of 6 FirstFirst ... 456
Results 101 to 119 of 119

Thread: How do you change the perception?

  1. #101
    Council Member Ken White's Avatar
    Join Date
    May 2007
    Location
    Florida
    Posts
    8,060

    Default Bill, just a suggestion

    If you'd keep your posts a little shorter and concentrate on one topic at a time while not using the various styles and sizes of type, you might encourage more responses. Your posts are sort of hard to follow due to length, mixed subject matter and erratic type fonts.

    Take care,
    Ken

  2. #102
    Registered User
    Join Date
    Jan 2008
    Location
    Indiana
    Posts
    8

    Default Iw

    Thanks for the reply Bill. One correction I would like to make is that the General Staff concept is Saddle Orders not Marching Orders. No coffee no wakee.

  3. #103
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Bill your concepts of cyber warfare are about 20 years out of date. Cyber-warfare is a sexed up term to refer to a "terrain". Much like land warfare, or naval warfare, or air warfare. Computers are tools used for good purposes and bad purposes much the same as tanks and trucks. Metaphorical analysis of cyber warfare will only carry you so far and the over use of the term rather than realistic terms only prejudices people against the topic.

    There is terrorism, it occurs through a variety of devices and techniques, and some of those devices are communications and computer networks. Information warfare uses computers much like it uses mass media but they are not inextricably linked. Command, control, communication, and coordination using information technology (C4IT) can be simplified as "computer mediated". What is missing from your posts (and I must admit the variety of fonts and incoherence of the posts makes them nearly unreadable) is a basic understanding of commodity computing and computer convergence. These two basic concepts enlighten and inform the conflict scholar about how computers are used and why they are used.

    A simple understanding of convergence and commodity tools might help. The ubiquitous refrigerator allowed for fresh foods and longer time in transit for foods. This created a more nutritious and higher value food source for soldiers. Those armies that had access and the resources to use refrigeration had a tactical advantage over their adversaries. Yet we never coined or used the term refrigeration warfare. When high value information technology assets were converged into military supply trains along with refrigeration capability the just in time supply line became a reality for food stuffs. Yet again we did not define war based on just in time inventory or it's convergence with refrigeration.

    C4IT is a converging communication paradigm that is both a tactical tool as well as a strategic terrain.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  4. #104
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default Greatful for everyone's replys and paradigm testing

    Thank you for your reply.

    Quote Originally Posted by selil View Post
    Bill your concepts of cyber warfare are about 20 years out of date.

    I am glad to hear that, somebody is 20 yrs ahead of us. That pleases me.

    Cyber-warfare is a sexed up term to refer to a "terrain".

    YES, exactly, we now have the Navy, Air force, Army to handle those "terrains", where are the "cyber forces", In this Terrain USA seems to be MIA.


    Much like land warfare, or naval warfare, or air warfare. Computers are tools used for good purposes and bad purposes much the same as tanks and trucks. Metaphorical analysis of cyber warfare will only carry you so far and the over use of the term rather than realistic terms only prejudices people against the topic.

    We have tried to demonstrate the practical application of our concept of a "cyber troop", I think the Theory is still being worked out.
    They are at war with the USA on the Internet, we reacted.

    There is terrorism, it occurs through a variety of devices and techniques, and some of those devices are communications and computer networks. Information warfare uses computers much like it uses mass media but they are not inextricably linked. Command, control, communication, and coordination using information technology (C4IT) can be simplified as "computer mediated". What is missing from your posts (and I must admit the variety of fonts and incoherence of the posts makes them nearly unreadable, some replys have been culled form our Internal docs.I will try and watch it, Thanks) is a basic understanding of commodity computing and computer convergence. These two basic concepts enlighten and inform the conflict scholar about how computers are used and why they are used.

    A simple understanding of convergence and commodity tools might help. The ubiquitous refrigerator allowed for fresh foods and longer time in transit for foods. This created a more nutritious and higher value food source for soldiers. Those armies that had access and the resources to use refrigeration had a tactical advantage over their adversaries. Yet we never coined or used the term refrigeration warfare. When high value information technology assets were converged into military supply trains along with refrigeration capability the just in time supply line became a reality for food stuffs. Yet again we did not define war based on just in time inventory or it's convergence with refrigeration.

    But we were not fighting on refrigeration trains, we are fighting on the Internet. I think it is a terrain deserving of troops.

    C4IT is a converging communication paradigm that is both a tactical tool as well as a strategic terrain. I agree.


    USA has run this type of paradigm before, and the result was the Air Force, separated from the Army.
    The sooner the USA spins off a "cyber force" the sooner USA will dominate that Terrain also.

    All Armed Forces will need to maintain a "cyber" capability dedicated to use of their service.

    Bill


    Last edited by BILL; 01-09-2008 at 12:49 AM.

  5. #105
    Council Member jcustis's Avatar
    Join Date
    Mar 2006
    Location
    SOCAL
    Posts
    2,152

    Default

    All Armed Forces will need to maintain a "cyber" capability dedicated to use of their service.
    I have read a number of good theories and explanations here at the Council, as well as a number of far-fetched propositions, and that by far is the worst I have seen in some time.

    BILL, we have enough of a challenge keeping our equipment and TTPs up to date, and now you expect each of the services to maintain a "cyber" warfare capability? Since you did not define the boundaries of that capability, I'm going to go out on a limb and assume that you mean a dedicated element of Soldiers, Sailors, Airmen, and Marines who do nothing but focus on youtube-centric warfare with opponents who are conducting assymetric attacks against us (pushing their own internet IO, service denial attacks, and generic hacking).

    Why does each service need its own force? Please offer some sort of force laydown to convince me that this is a good thing.

    It took the Marine Corps a few years to come into the fold of NMCI, and guess what? It works for crap most of the time and actually restrains our productivity to a degree. Staying current with the technology leaps every six months is not a job I would wish on anybody, especially since the program is guaranteed to teeter on the whim of budget constraints every year.

  6. #106
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default

    The Strategy Page describes how China assembled a force few have heard about. In idyllic 1990s, the Chinese Defense Ministry established a research organization called the "NET Force" geared towards conducting information warfare. NET Force was soon joined by an irregular civilian militia; the "Red Hackers Union" (RHU). "Starting in the late 1990s, China assembled what has now become 30,000 Ministry of Public Security employees manning the Golden Shield Project (also known as The Great Firewall of China), and monitor Internet use throughout the country."

    Excellent points: Hard Questions.
    Here is a start: Not comprehensive but a taste.

    Quote Originally Posted by jcustis View Post
    I have read a number of good theories and explanations here at the Council, as well as a number of far-fetched propositions, and that by far is the worst I have seen in some time.

    BILL, we have enough of a challenge keeping our equipment and TTPs up to date, and now you expect each of the services to maintain a "cyber" warfare capability? Since you did not define the boundaries of that capability, I'm going to go out on a limb and assume that you mean a dedicated element of Soldiers, Sailors, Airmen, and Marines who do nothing but focus on youtube-centric warfare with opponents who are conducting assymetric attacks against us (pushing their own internet IO, service denial attacks, and generic hacking).

    Why does each service need its own force? Please offer some sort of force laydown to convince me that this is a good thing.

    Consider the reasons you keep TTPs up todate. The same concepts, motives apply.

    Also:
    This is an arena in your theater of operations, "they" are using to great effect, some guy in a cave, Sets the Internet Paradigm.
    And USA does not dominate this terrain.
    I think each Force should be represented in each terrain they are being fought in.

    Force Protection. Recent example, on Arabic forum posted "his" brother was starting a sniper cell in "X" small Iraq city, we made appropriate notifications the same day the post was made.

    Closed cell penetration, forecasting possible.

    and
    If you win their "hearts and minds" you don't have to shoot them.
    And they won't be shooting at you. KIA reduction.

    Force Multiplier: In "Jawbreaker" they utilized no OSINT capabilities, and were using 10 year ? outdated maps they found at the American Embassy.

    After Bhuttos attack, Pakistan Army was doing PR that "it wasn't them", and going on the defensive, and offering shopping lists of possible perps, while civilian blogs were posting al Qaeda claimed credit and link references.
    The P Army could have been on the offensive instead of the defense with a good OSINT arm. Lack of info just made them look suspect.

    It took the Marine Corps a few years to come into the fold of NMCI, and guess what? It works for crap most of the time and actually restrains our productivity to a degree.

    I feel your right I have seen all the services represented in our Blog logs except for the Marines.

    Staying current with the technology leaps every six months is not a job I would wish on anybody,

    Great point, I hadn't thought about, we follow a few venture capitalist news letters that list all the new "social tools" and OSINT techniques and applications, although they don't always recognize those uses. The "Baby Feed" includes These news letters and the data they need to stay on top or up to date. We made our Blog 'cell phone friendly'
    in 30 min. through new site they invested in ( Whole new demographic ).


    especially since the program is guaranteed to teeter on the whim of budget constraints every year.

    Yes at the start of WWII USA had very limited number of tanks, scary.
    It will take time to prove its RIO, ( return on Investment ).
    It has already lead to al Qaeda's back door, thru tracking webmasters, arrests, and hard drive recovery's.
    I think the 'cyber warroir' gives you a new gun, force, Knowledge vector to guide Kinetic force.
    A new terrain to destroy enemy initiatives, counter lies, propaganda, spin, track and target.
    Bill
    Last edited by Jedburgh; 01-09-2008 at 11:55 AM.

  7. #107
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Bill, some discontinuous dissonance as a mirror to rambling rebellion.

    The thing is we do have a communications and computer systems agency for dealing with hostile attacks. That is the mission of the NSA along with all other forms of signals intelligence. Second the United States as a land of law has treaties that say we will not attack other nations. You said in an earlier post that you had engaged in cyber-attacks which would be a direct violation of federal law. The Air force is standing up a cyber warfare command which will be interesting for a bunch of other reasons.

    Currently hacktivism and petty graffiti attacks are the primary "hacks" that occur. With the exception of a few different attacks like "Titan Rain" and high profile spy ware break outs.

    You totally missed the metaphor of ubiquitous communications and commodity computing as a "utility" making it air or water rather than "special". You need C4IT like you need anything else like food. C4IT makes you a better warrior but it isn't the only battlefield or tool. When you realize the Internet exists beyond the http, ftp, protocols and you dig deeper (i'm not talking dark net) the vista of the Internet takes on a deeper and broader view.

    How is a predator drone controlled?
    What gives a jdam the high accuracy that it known for?
    What provides the telemetry for a cruise missile?
    How are operational orders transmitted between general staffs and unit commands?

    There are only three forms of attack possible (plus two but that is another story) over networks and computer mediated environments.

    You'll have to start defining your terms better here.

    A point as to etiquette as a user of THIS web forum I'm interested in using THIS web forum. Provide a link in your signature to your blog but stop trying to send us off to your website. I'm not interested in having my IP harvested, my click through behavior analyzed, or my interactions and interests monitored. Further posting large volumes of information from another BLOG here on another forum without permission from the owners of SWC/SWJ is bad news. You are fairly anonymous (your introduction left a lot to be desired) and with anonymity comes distrust. For all I know you are just violating intellectual property laws (good taste at least) and posting somebody else's blog information here as part of some IW campaign.

    In any regards I think you're mixing information warfare and cyber warfare. If you start reading something like "In Athena's camp: Preparing for conflict in the information age. (1997). Santa Monica, CA: RAND." and the updated "Networks and netwars: The future of terror, crime, and militancy. (2001). Santa Monica, CA: RAND"that will take you down the information warfare and network centric warfare path you seem to be going. This is more akin to information operations than it is to tactical use of a computer for attack.

    Just as a simple example information warfare is about message, and controlling the communication channel. In my laboratory cyber warfare (sic) is about destroying your capability to communicate, intercepting your command and control information, or changing your message without you knowing that we've done so. Those are simplistic examples of the confidentiality, integrity, availability triad which you can read more about from "Maconachy, W. V., Schou, C. D., Ragsdale, D., & Welch, D. (2001). A Model for Information Assurance: An Integrated Approach. Paper presented at the 2001 IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY.".

    Think about defining your terms a little better within the context of your statements. Within this area of research the disciplines jargon is not fully understood.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  8. #108
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default

    "You said in an earlier post that you had engaged in cyber-attacks which would be a direct violation of federal law."
    I've gone out of my way to confirm we do not engage in illegal activities, ie hacking, and certainly have not violated any federal laws,
    Thats quite a threating accusation.

    Please provide quotes, I don't want any misunderstandings.
    Or unnecessary investigations, based on a mis-communication.

    Maybe its a misunderstanding of term "cyber attack".
    I'd like to clear this up. thanks for checking it out. Others may have taken it that way too.

    Don't remember saying that, certainly didn't mean it in that context..
    Now I'll read the rest of your post.
    Quote Originally Posted by selil View Post
    Bill, some discontinuous dissonance as a mirror to rambling rebellion.

    The thing is we do have a communications and computer systems agency for dealing with hostile attacks. That is the mission of the NSA along with all other forms of signals intelligence. Second the United States as a land of law has treaties that say we will not attack other nations. You said in an earlier post that you had engaged in cyber-attacks which would be a direct violation of federal law. NO , NOT: The Air force is standing up a cyber warfare command which will be interesting for a bunch of other reasons.

    Currently hacktivism and petty graffiti attacks are the primary "hacks" that occur. With the exception of a few different attacks like "Titan Rain" and high profile spy ware break outs.

    You totally missed the metaphor of ubiquitous communications and commodity computing as a "utility" making it air or water rather than "special". You need C4IT like you need anything else like food. C4IT makes you a better warrior but it isn't the only battlefield or tool. When you realize the Internet exists beyond the http, ftp, protocols and you dig deeper (i'm not talking dark net) the vista of the Internet takes on a deeper and broader view.
    I agree.
    How is a predator drone controlled?
    What gives a jdam the high accuracy that it known for?
    What provides the telemetry for a cruise missile?
    How are operational orders transmitted between general staffs and unit commands?

    There are only three forms of attack possible (plus two but that is another story) over networks and computer mediated environments.

    Please define these three, for clarity.

    You'll have to start defining your terms better here.

    A point as to etiquette as a user of THIS web forum I'm interested in using THIS web forum. Provide a link in your signature to your blog but stop trying to send us off to your website.

    The links are for additional info and shorten some of my already long and rambling posts.

    I'm not interested in having my IP harvested, my click through behavior analyzed, or my interactions and interests monitored.

    I WOULD SUGGEST A PROXY, TO PROTECT YOUR PRIVACY.

    Further posting large volumes of information from another BLOG here on another forum without permission from the owners of SWC/SWJ is bad news. You are fairly anonymous (your introduction left a lot to be desired) and with anonymity comes distrust. For all I know you are just violating intellectual property laws (good taste at least) and posting somebody else's blog information here as part of some IW campaign.

    With the anonymity comes some security, abet limited, and your right one should not trust anyone you 'meet' on the web, I'm just asking for consideration of my concepts and feedback. If your concerned you can email the Internet Anthropologist Blog and confirm for your self my permissions, if your so inclined.
    contact email is listed as barb.andrews at gmail.com
    And thanks for looking out for us.

    In any regards I think you're mixing information warfare and cyber warfare. If you start reading something like "In Athena's camp: Preparing for conflict in the information age. (1997). Santa Monica, CA: RAND." and the updated "Networks and netwars: The future of terror, crime, and militancy. (2001). Santa Monica, CA: RAND"that will take you down the information warfare and network centric warfare path you seem to be going. This is more akin to information operations than it is to tactical use of a computer for attack.

    I'll read them, thanks

    Just as a simple example information warfare is about message, and controlling the communication channel. In my laboratory cyber warfare (sic) is about destroying your capability to communicate, intercepting your command and control information, or changing your message without you knowing that we've done so.

    These are more in the realm of official government actions and Generally not appropriate for civilian ops.

    Those are simplistic examples of the confidentiality, integrity, availability triad which you can read more about from "Maconachy, W. V., Schou, C. D., Ragsdale, D., & Welch, D. (2001). A Model for Information Assurance: An Integrated Approach. Paper presented at the 2001 IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY.".

    Thanks

    Think about defining your terms a little better within the context of your statements. Within this area of research the disciplines jargon is not fully understood. I agree.
    Bill
    Congrads on your DHS Fellowship, its nice to have an Expert around.

    .
    Last edited by Jedburgh; 01-09-2008 at 11:57 AM.

  9. #109
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Quote Originally Posted by BILL View Post
    I've gone out of my way to confirm we do not engage in illegal activities, ie hacking, and certainly have not violated any federal laws,
    Thats quite a threating accusation.

    Please provide quotes, I don't want any misunderstandings.
    Or unnecessary investigations, based on a mis-communication.
    In this thread your posts #47 and post #100 you make suggestions about operatives taking direct actions against terrorist organizations AND civilians providing denialbility. Perhaps I misread and took that to literally. In my experience direct action equates to the adversary not having the will of ability to act further.

    Hacking is a pejorative term that has been bent and blended into uselessness so I'm immediately suspicious at it's use (your post on hacker training this thread #97). If we are talking about message, communication channels, or more succinctly propaganda then that is one discussion. If we are talking about creating kinetic effect (your post #106) through computers that is another discussion. From what you've posted it seems you are mixing the two concepts and they are not the same. It was recently declassified that it is perfectly possible to use computers for kinetic effect and blow up a generator.

    Quote Originally Posted by BILL View Post
    Congrads on your DHS Fellowship, its nice to have an Expert around.
    Thank you. It's always nice to get outside recognition. Between, Purdue, NSA, DOD, NSF, and now DHS I have effectively paid zero money to realize my personal goal of getting a PhD.

    As a faculty member at a regional university (third tier somebody once called it) funding and grantsmanship are little tougher to acquire than at an R1. You won't find it on my BLOG but I have a little over $1.5 million in outside and internal funding over the last four years. I'm especially proud of my Cisco funded security laboratory and virtual network laboratory system.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  10. #110
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default DEATH THREATS AGAINST BUSH! HOSTED IN calf

    We tracked the web master to Kuwait,
    He took web page down over night,
    then put it back up under someone else's name and changed text,
    Then he says its not monitored.

    More here:

    Huge campaign to assassinate Bush.
    Bill
    Last edited by BILL; 01-11-2008 at 08:01 PM.

  11. #111
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default Connections

    "Al-Qaida's MySpace": How Suicide Bombers Are Being Recruited Online

    By Evan Kohlmann

    This morning, the Combating Terrorism Center at West Point released the second issue of its Sentinel journal, including my new piece on "Al-Qaida's MySpace"--which tracks a growing number of case studies in which users on extremist Internet forums such as Al-Ekhlaas have been vanishing off the forums, only to suddenly re-appear later as suicide bombers in the service of Al-Qaida in Iraq. The report includes both testimonials gathered from the forums themselves, and never-before-seen evidence uncovered during the British investigation of "Irhaby 007" (a.k.a. Younis Tsouli). Tsouli's former headquarters on the web--the Muntada al-Ansar forum--was a major center for such online terrorist recruiting. In August 2005, a senior Muntada al-Ansar administrator broke the “good news” to fellow users about a “meeting of Ansar forum members” inside Iraq:....

    "This story is fascinating and emotional because it is closely linked to… the Ansar forum… One of our brothers who was a member on the Ansar forum and was originally from a country adjacent to Iraq decided to leave and fight in the cause of Allah. Allah made it possible for him to meet with an additional five brothers from other countries who had all come to fight in the cause of Allah… Later, after talking with one another, they all realized that they were fellow users on the Ansar forum, and that made them very happy. They began crying and their love for Allah increased… I also inform you that one of the brothers who is a member on the Ansar forum will soon rejoin his beloved comrades in the land of jihad and martyrdom, the land of Mesopotamia, and he will also participate in a suicide operation."

    SOURCE:

    100 Jahiddies on Facebook

    Bill

    I think this thread demonstrates how we adopted Competitive Intelligence methods over the past year to Counter Intel.
    And hope it is usefull, we are user friendly and available.
    Last edited by Jedburgh; 01-19-2008 at 01:33 AM. Reason: Edited links. No e-mail addresses in posts.

  12. #112
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default Just released today

    New Jahidiie encryption program.
    and
    We have the Computer IP forTaliban webmaster, Adil Watanmal (aka Murchal), and location.

    B
    Last edited by BILL; 01-19-2008 at 04:41 AM.

  13. #113
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default What to do with the terrorist web sites?

    Would like your input/thoughts.


    Ddan has an interesting post on the subject: here

    What to do with the terrorist web sites?

    It is a involoved paradigm, and we are picking our way through the potential mine field.

    Some argue to leave them up for the Intel production.
    And that some Intel may be lost if they are shut down.

    Dan speaks of a tipping point.

    I am also looking at a tipping point.
    A different tipping point.

    Consoider for a moment if ALL terrorist sites were taken down,
    one swipe world wide?

    That would have a significant impact on recruiting, and generating home grown terrorist, and many other benefits.

    Each time a site is shut down, they loose part of their audience,
    and loose data and creditability.
    Not to mention the security they must build and maintain to set up a new site,
    and the psysic energy and the blow to morale, consider loosing your own Blog.
    The wasted time setting it back up knowing it will be shut back down again.
    and loss of command and control, and com links.
    If they email members of the new site then they are also notifying us.
    We are hidden in their lists.

    We have passwords to most sites, and back doors and mine them for links, urls and members
    and copy the entire site before shut down. And are working to make these copies
    available to the FEDS, we know they probally have copies already, but in case we take down one that don't have a copy for , we do have the copy. We have the man power to avail our selves
    of these capabilities with Company "C".

    Company "C" allows me to move from Intel collection and reporting to developing actionable Intel for the FEDS, and planning operations and prosecuting the GWOT with in legal limits.
    In an area that needs service.

    We also give the FEDS prior notice before we take down a site, and are willing to sign secrecy
    agreements on any sites they want to remain up.

    Of course it can be argued that this drives them to the Dark web.
    Which limits their public recruitment and command and control to the Ummah.
    And reduces the number of sites.

    And we have moles working in many of these dark sites.
    If you have a dark site it limits your recruitment and public influence.
    And command and control to a very limited cadre.

    The estimates we have seen estimate there are 4,000 terrorist web sites.

    We recently took down a little known hub for propaganda distribution.
    Thousands of vids very little text.

    The number of terror sites hosted by American Companys could be drastically cut
    by a few prosecutions under current laws, as it stands now their is no down side
    to hosting a terror site other than Bad PR when they are caught, and then they
    claim they didn't know. . Violation authority cited:
    And many hosts just ignore the complaints, currently without
    any prosecutions the law is with out teeth.
    Company "C" is looking for an Attorney to file complaints against the
    hosts for violation the laws, we can supply the complainant and evidence.

    Drive them to web sites in terror supporting countrys and
    you open the possibility of direct attacks on servers by USA military.
    Under the color of law and war.

    We think this is a workable solution to the 4,000 terror web sites
    and maintain copies of sites for further study.

    Bill


  14. #114
    Council Member Ken White's Avatar
    Join Date
    May 2007
    Location
    Florida
    Posts
    8,060

    Default On the other hand...

    Some disagree...

    LINK

  15. #115
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default Bizzzar

    The argument seems to be leave the terrorist sites up to collect Intel,
    Well the total number have grown to over 4,000. sites.
    And the sites are recruiting others and the number of sites continue to grow.

    This paradigm will insure the growth of Jahiddie sites, at what point do they put stopping recruitment ahead of intel gathering?

    Feels like the cart before the horse.

    Watch them grow and collect info???

    Bizzar
    G

  16. #116
    i pwnd ur ooda loop selil's Avatar
    Join Date
    Sep 2006
    Location
    Belly of the beast
    Posts
    2,112

    Default

    Taking down the "terrorist" websites completely is the metaphorical form of conventional warfare versus small wars type doctrine or counter insurgency. Wholesale disruption of terrorist websites would be denying the insurgent the terrain. When in reality according to counter insurgency you wish to change the perception of the insurgent not embolden them to new or higher levels. You don't want to create an asymmetric arms race that only they can win. It could be argued that destruction of the terrorist communication mechanism actually hurts the effort.
    Sam Liles
    Selil Blog
    Don't forget to duck Secret Squirrel
    The scholarship of teaching and learning results in equal hatred from latte leftists and cappuccino conservatives.
    All opinions are mine and may or may not reflect those of my employer depending on the chance it might affect funding, politics, or the setting of the sun. As such these are my opinions you can get your own.

  17. #117
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default boggled

    "It could be argued that destruction of the terrorist communication mechanism actually hurts the effort."
    AND
    "You don't want to create an asymmetric arms race that only they can win."

    Gee Selil you must be playing devils advocate.

    I was speechless.
    If this is the paradigm then its gone around the Bend, the work product has superseded the Goal.
    That seems akin to "giving them bullets so we can see where they are", when they shoot at us.
    The hard core are not likely to be converted.

    "an asymmetric arms race that only they can win"
    I couldn't disagree more.

    The only way THEY can win on the WWW is if USA doesn't mount an offensive.

    It sounds like it may have been decided USA can't win on the WWW.

    Watch Company "C" we will curb them.

    Thanks for your comment.


    Bill
    Last edited by BILL; 03-23-2008 at 03:06 AM.

  18. #118
    Council Member slapout9's Avatar
    Join Date
    Dec 2005
    Posts
    4,818

    Default

    Quote Originally Posted by BILL View Post
    Would like your input/thoughts.




    Company "C" is looking for an Attorney to file complaints against the
    hosts for violation the laws, we can supply the complainant and evidence.


    Bill

    [/B][/B]

    You might want to try the SPLC Southern Poverty Law Center, they have done some things like this in the past, but it usually against Domestic groups. http://www.splcenter.org/index.jsp
    Last edited by slapout9; 03-23-2008 at 02:51 AM. Reason: add link

  19. #119
    Council Member BILL's Avatar
    Join Date
    Dec 2007
    Posts
    41

    Default thanks

    Excellent Idea
    DONE.

    Bill

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •