7/04/2003

GET READY FOR ASYMMETRIC WARFARE AND IDIOSYNCRATIC ATTACKS

YOU JUST KNEW THAT ONCE THE "INTELLEKCHEWULS" STARTED STUDYING TERRORISM THEY'D COME UP WITH A NAME CHANGE. GET READY FOR: "ASYMMETRIC WARFARE" AND "IDIOSYNCRATIC" ATTACKS.

Let me break it down for you in a way a normal person NOT on a goddam grant from the government would tell it.

1. We face Islamic Terrorism dating from the time of the Assassins 1,000 years ago (The Assassins were a Shiite radical group). Today's terrorism doesn't have the complex balance of air, land, sea, space, and large armed forces. This balance, which we do possess, is called "symmetrical". So we can launch coordinated attacks. On the other hand they have a bomb here, some dynamite there, a machine gun, and so on; this makes them "asymmetrical", no balance in an attack. And no pattern of predictability about the next attack or method. Like duh.

2. These "asymmetric" warriors use our own "off the shelf" units like busses, cars, planes, computers, and so on against us. They also use them effectively to perform their own tasks. Again like, duh. They also use our "system", meaning our democracy, to lay low for a long time before acting.

3. "Idiosyncratic" is the grant money word for an attack on sensitive places we may not realize are sensitive, until too late; the WTC being a classic example where our entire financial structure was HQ'd in a single space. Again, like duh. Give me some grant money. Recent attaks on mosques, Saudi Holy Places, and the Iraqui Police graduates fall into this category. The attacks do damage to government. The attack in Moscow ditto.

4. Terror networks use off the shelf encrypted 512 bit technology to communicate with each other and by the time we solve the encryption, the message has "timed out", meaning the damage has been done And ten or a thousand "dummy" encryptions are out there too.

5. They also use "embedded pixel" technology which is basically impossible to find and decode. In this technology a single pixel on a single frame of computer communication (picture, news item, etc.) has a message. This is another "off the shelf" technology.

6. Spamming, hacking, and other "off the shelf" tech can be used to paralyze servers etc.

So what? Who doesn't know this? Do we need a guy on a grant to tell everyone this stuff? How do these intellectuals propose to fight an "asymmetrical" opponent? Do we use asymmetrical or idiosyncratic methods ourselves? Murder their leadership? No. String up the people we catch on the public square so everyone can see what happens to a terrorist? No. What we have to do is get better on the ground intel, have our intel services work together, and train our troops better.

So there you have it. 16 pages of bullshit boiled down into a few paragraphs.

I'd only add here that our intel has gone down hill since Carter back in ?‘76 and until 2001 nobody has worked to build it. We aren't going to fix this in one year or even five. We have nobody on the ground in places like Liberia, The Congo, Iraq, Saudi Arabia, and so on. So we are now developing these sources.

But do you think they will remain in place if Hillary Clinton looks like she MIGHT win in 2008? I doubt it. It was the Clintons who supplied the coup de gras to our Intel Network allowing many spies to be murdered. Nobody will trust her not to do the same.


No comments: