Results 1 to 20 of 85

Thread: Virtual Militias

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member Tom Odom's Avatar
    Join Date
    Oct 2005
    Location
    DeRidder LA
    Posts
    3,949

    Default

    Quote Originally Posted by SteveMetz View Post
    Like OSD, okra can be de-slimed with the proper technique.
    you mean it can be...

    transformed?

  2. #2
    Council Member Hacksaw's Avatar
    Join Date
    Oct 2007
    Location
    Lansing, KS
    Posts
    361

    Default My head is Bloodied and Bowed.... well kind of...

    All,

    I readily except all criticisms regarding my "construct". Words are important, so the use of "stasis" and near-perfect" information is dubious for supporting rigorous evaluation. I just lack the vocabulary/time to communicate clearly.

    I would like to clarify that I have no illusion whether this model, if applied to a single actor, would necessarily predict behavior in a micro sense. "Rational" behavior is in the eye of the beholder, but at a Huntington-civilization level I propose that the effect of an ever-present info-sphere will dampen radical upheavals/flucuations if for no other reason that it becomes damn difficult for any single actor/group to maintain the illusion of an alternative "reality". Even the super-powered individual will have difficulties with "staying power"

    I suppose we'll just have to agree that the mob is right and I'll wallow in my ignorance

    Live well and row
    Hacksaw
    Say hello to my 2 x 4

  3. #3
    Council Member Cannoneer No. 4's Avatar
    Join Date
    May 2007
    Location
    Georgia
    Posts
    140

    Default Virtual Militia Helped Catch Jihad Jane

    Jihad Jane thread over at The Whole News
    http://council.smallwarsjournal.com/...ead.php?t=9957

  4. #4
    Council Member Cannoneer No. 4's Avatar
    Join Date
    May 2007
    Location
    Georgia
    Posts
    140

    Default Deterring Chinese Cyber Militias with Freedom Militias

    http://ndupress.blogspot.com/2010/04...tias-with.html

    US defenses are insufficient to stop Chinese cyber attacks. The US-China Economic and Security Review Commission estimates that Chinese cyber attacks cost the US hundreds of billions of dollars annually. By way of comparison, this is substantially more than the entire Chinese military budget.

    What is needed is a threat that is both capable of forcing China to take notice and that it will believe the United States would execute. Such a threat exists. While China's regime does not appear willing to be deterred by conventional diplomatic or legal complaints, it has demonstrated considerable concern about threats to its censorship apparatus.

    The most effective way to threaten Chinese censorship would be for US and partner nations to develop their own cyber militias. Rather than stealing intellectual property and disabling public institutions, however, Western militias would aim at finding ways to bypass Chinese firewalls to spread internet freedom.
    From National Defense University Press Blog

    America already has cyber militias doing PSYOP, and this is a call for cyber militia CNA.
    Last edited by davidbfpo; 01-21-2011 at 09:16 AM. Reason: Quote marks not italics, PM to author

  5. #5
    Council Member Cannoneer No. 4's Avatar
    Join Date
    May 2007
    Location
    Georgia
    Posts
    140

    Default In the chatroom with the cyber guerrillas

    http://www.reuters.com/assets/print?...70I2DW20110119

    FIRE YOUR CANNON

    All you need to wage cyber war is a fast-paced internet forum packed with hundreds of determined activists and a simple piece of software called a Low Orbit Ion Cannon. Activists download the LOIC -- initially developed to help internet security experts test website vulnerability to DDoS attacks -- and start firing packets of data at the targeted website.

    If enough people join in, a DDoS attack prevents the overloaded server from responding to legitimate requests and slows the website to a crawl or shuts it down totally.

    Attackers can even listen to a dedicated internet radio station, Radiopayback, during attacks.

    A quarter of a million copies of the LOIC software have been downloaded from sourceforge.net so far, more than half of them since November when Web hosting and banking organizations began withdrawing support from WikiLeaks.
    LOIC is a volunteer botnet and psychological operation that gives large numbers of unsophisticated wannabe hackers the feeling that they're Information Operators, too.

    Meanwhile, an individual or group calling himself or themselves th3j35t3r has been doing Cyber COIN and counterpropaganda.

  6. #6
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    The year 2010 was a hugely significant one for computing criminality and could turn out to mark the beginning of a ‘third era’ of cybercrime, security expert Graham Cluley of Sophos has said in advance of the company's latest threat review of the year.
    http://news.techworld.com/security/3...e-says-report/
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  7. #7
    Council Member Cannoneer No. 4's Avatar
    Join Date
    May 2007
    Location
    Georgia
    Posts
    140

    Default Virtual Militia Recruiting Poster

    http://i.imgur.com/LfLhN.png

    Using Civilian Irregular PSYOP to encourage Civilian Irregular CNA, this time against the Mubarak regime.

    For discussion purposes only.

    Notice the .ru

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •