On the Guerrilla, His Ecology and His Communications

On the Guerrilla, His Ecology and His Communications

The Guerrilla must recognize three critical points:

 

  1. He, and his local network, are his own supply line.

  2. He fights with what he has, not with what he wishes.

  3. He cannot fight as a conventional force.

 

If you have not already, be sure and order your copy of The Guerrilla’s Guide To The Baofeng Radio.

Take Heed and Prepare Accordingly.

 

Cartel Corner: CJNG, The Only Cartel To Have Had Its Own Arms Factory

CJNG, The Only Cartel To Have Had Its Own Arms Factory

In perusing some list folks have created as to the “Top 10 Predictions for 2023” not one of them list the Southern Border WAR.

Notice I did not use the word “crisis.”

We have been beyond “crisis” since 2008.

No, it’s a legitimate state of WAR down here in Wild Bunch Land, complete with a U.S. Government funded (and complicit) foreign invasion happening every single day.

Forget the threat to “America” as so many like to talk about. America as you know it is GONE. FUSA is in smoldering ruins.

What concerns me now as an ardent Southern Nationalist and Texas Secessionist is the threat to my Home State of Texas these Government Funded Cartels Represent.

Let’s be clear: Mexican Drug Cartels are nothing but a U.S. Government Proxy.

The Criminal Insurgency these Cartels are executing on a daily basis on the border to include drug trafficking, human trafficking (tens of thousands of illegal aliens flooding this country every day) and all other sorts of sordid criminal enterprises are being done with one irrefutable goal and agenda in mind:

THE DESTRUCTION OF WHITE PEOPLE AND THEIR CULTURE.

Prepare and Act Accordingly.

 

Cyber-Security: WOROK – Powerful Malware Hidden in .PNG Images

WOROK: Powerful Malware Hidden in .PNG Images

 

“Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security conscious, you probably also know that PDF files, Excel spreadsheets, and Word documents can also contain malicious code. But how many times have you considered the possibility of malware hidden inside an image file? A sophisticated hacking group known as Worok has developed a new type of malware that can be concealed in innocuous-looking PNG images, and they’ve been using it to target governments and large corporations around the world.”

 

SHTF Self-Education Series Book Review – “Winning Insurgent War: Back to Basics”

SHTF Self-Education Series Book Review from the Library – “Winning Insurgent War: Back to Basics”

 

Note to my Readers: I had some issues downloading the .pdf version of this book with the links provided, so in prowling around I found this link which worked fine:

https://community.apan.org/wg/tradoc-g2/fmso/m/fmso-books/195392/download

 

 

Study Up and Train Hard!

The History of Irregular Warfare (Six-Part Series)

H/T WRSA

 

Irregular Warfare Six-Part Series

 

Superb series I recommend you put on your Reference flash drive.

While you are it, Guide to the Analysis of an Insurgency is also worth downloading.

Arm Up, Read Up and Train and Prepare Accordingly.