TBR News July 18, 2016

Jul 18 2016

The Voice of the White House

Washington, D.C. July 18, 2016:” For the past ten years, there have been growing fears that somehow, outsiders have been able to penetrate into the confidential computer files of government agencies, business entities such as banks and defense contractors and individuals.

Some of this appeared to be an attempt to obtain highly classified information that could be of use to others and in other instances, attempts to get into the personal, and corporate, bank accounts of individuals and corporations.

This is a brief study of some of the salient aspects of this problem of computer theft and espionage and we will start with the discovery of massive computer penetration in Israel. We will then consider further penetrations of American business and intelligence computer systems by agents of a foreign government as opposed to confidence men and then conclude with the use of the same methods to commit frauds on the gullible in the United States and elsewhere.

Some of the first public notice of this problem surfaced first in Israel in 2004 when  Israeli law enforcement cyber crime experts discovered that what is known as a Trojan Horse (illicit spyware planted on an unsuspecting computer) had been inserted into about 60 major Israeli businesses. Isreali law enforcement subsequently indicted various members of three of Israel’s largest private investigative agencies on charges of criminal fraud. These spyware plants were in various commercial areas such as : Israeli military contracting, telephone systems, cable television, finance, automobile and cigarette importing, journalism and high technology. These intrusive spyware plants were nearly identical with ones developed by the American NSA and widely used inside the United States to glean political, economic and counter-intelligence information from a huge number of American businesses and agencies. Israeli investigators believed that there was illicit cooperation between the American agency and a counterpart in Israel.

These Trojan horses that penetrated the Israeli computers came packaged inside a compact disc or were sent as an e-mail message that appeared to be from an institution or a person that the victims thought they knew very well. Once the program was installed, it functioned every time the victim’s computer system was in use, logging keystrokes or collecting sensitive documents and passwords before transmitting the information elsewhere.

This clandestine theft of valuable commercial, military and political secrets is certainly not limited to Israel and many important agencies and individuals have become increasingly concerned about what is called “phishing” in which both con men and foreign (and domestic) intelligence agencies can locate, capture and use valuable personal, political and financial information. In September of 2005, the Anti-Phishing Working Group, an ad hoc group  of corporate and law enforcement groups that track identity theft and other online crimes, said it had received more than 13,000 unique reports of phishing schemes in that month alone, up from nearly 7,000 in the month of October, 2004..

In late 2005, a new form of phishing, called “spear-phishing” emerged.

So-called spear-phishing is a highly concentrated and far more effectove version of phishing. That’s because those behind the schemes bait their hooks for specific victims instead of casting a broad, ill-defined net across cyberspace hoping to catch throngs of unknown victims.

Spear-phishing, say security specialists, is much harder to detect than phishing. Bogus e-mail messages and Web sites not only look like near perfect replicas of communiqués from e-commerce companies like eBay or its PayPal service, banks or even a victim’s employer, but are also targeted at people known to have an established relationship with the sender being mimicked. American banks such as Chase and Bank of America are among those whose names are faked and also the online auction house of Ebay and the international money transfer firm of PayPal receive considerable attention from the international conmen and credit thieves. These thieves are not necessarily gangs operating for financial gain but also include theft of trade secrets, private corporate banking and highly sensitive military and political information.

While some of these phishers are merely out to make money, others are interested in securing military secrets and political activities, all at the highest and what is hopefully considered as the most secure.

As a case in point, in June of 2005 , the National Infrastructure Security Coordination Centre, a British government agency that monitors national UK computer security, took the step of publicly warning about a spear-phishing campaign of “targeted Trojan e-mail attacks” aimed at industrial and government computer networks. The warning noted that the e-mail messages appeared to come from a trusted sender, that antivirus software and firewalls was completely incapable of  protecting  recipients, and that, in fact, there was no way to completely protect any computer connected to the Internet from the Trojan attacks once recipients opened and downloaded a faked e-mail message containing a virus.

The report noted that: “Files used by the attackers are often publicly available on the Web or have been sent to distribution lists,” the warning said. “The attackers are able to receive, trojanise and resend a document within 120 minutes of its release, indicating a high level of sophistication.”

Also,a more traditional phishing scam infected about 30,000 individual computers worldwide, according to CipherTrust, a computer security firm. Consisting of what CipherTrust said was about 50 million e-mail messages that a German hacker deployed simultaneously, the communiqués purported to come from the Federal Bureau of Investigation, the Central Intelligence Agency and a German intelligence agency and tried to convince recipients to provide personal information and open a file containing a virus. The F.B.I. issued a warning about the scheme and a spokeswoman said that thousands of people swamped the agency with phone calls inquiring about it. Public awareness and FBI actions sharply reduced and finally obliterated this specific form of fraud but no information has been released to the public by the FBI concerning the identity or motives of many of the hackers. No bank or financial institution ever contacts their depositors and customers by email with warnings about misuse of their credit cards or errors in their personal accounts. The phishers have advanced technologically to the point where actual company logos can be snatched from Web sites to build customized databases of corporate logos. Any email message purporting to come from any bank or financial institution, most especially one that has the proper company logo and format but contains grammatical errors should ever  be responded to.

Some computer security specialists suggest at least one basic approach that might allow e-mail recipients to learn right away that a communiqué appearing to come from a company like Amazon.com actually originated somewhere in the Ukraine, Romania, Bulgaria, Poland, Russia or any of the other places that law enforcement officials say are hot spots for phishing scams.
According to CipherTrust, a spear-phisher can rent a server for about $300 month after paying a $100 setup fee; install spam-sending software on the server for about $1,200 a month; and get spam-sending proxies, a database of e-mail addresses, and other necessary add-ons for another $1,900 a month. How much phishers make depends on how many victims they hook, but the relatively small expense means the work can be lucrative. According to a research report issued in June by Gartner Inc., a consulting firm, about 2.4 million Americans reported losing about $929 million to phishing schemes during the previous year.

In 2016, is has been estimated by the FBI and private cyper-protection agencies that about 82 million American adults who use the Internet believed that they received an average of more than 50 phishing e-mails during the prior 12 months. And that, of course, is just what Internet users actually know might be happening.

Phishers main goal is to obtain a victim’s checking-account number and, in addition, credit card and A.T.M. card numbers, which they can copy onto bogus cards they have manufactured for the purpose of extracting money and goods from a victim’s account.

It should be noted that many American banks have serious security gaps in the software used to analyze magnetic stripe coding on the back of A.T.M. cards, and these gaps have permitted card hijackers to use bogus copies. American regulators, concerned about online vulnerabilities at the country’s banks, have sharply tightened security requirements at financial institutions.

Although Interner Provider (IP) numbers lead to Italy, the Netherlands, the Ukraine, Romania, Bulgaria, Poland, and Russia, a secret investigation by NSA and other American domestic and foreign intelligence agencies has disclosed that almost all of the scams originate inside Israel and that while the Israeli authorities are aware of this, the fact that information considered “vital to the interests of the State of Israel” is part of the intercepts, no action has been taken against operations that are not directed against Israeli agencies or individuals.  Further, one of the caveats to the continued functioning of these enormously profitable computer frauds is that any monies gleaned from them must be deposited in Israeli, and not foreign, banks.

Isreali intelligence, having formed a cooperative association with Israeli internet swindlers, has, according to an NSA report, not hesitated to spy on their American counterparts.

Among the Israeli corporations on the receiving end of stolen information were two telecommunications affiliates of Bezeq, the country’s largest telephone company. The Israeli government held a controlling interest in Bezeq until it sold most of its stake to private investors, including Los Angeles media mogul Haim Saban, shortly before the Trojan horse scandal became public. A lawyer representing Bezeq and the two affiliates, YES and Pele-Phone, declined to comment on the investigation; Mr. Wismonsky said that Bezeq itself appeared to have been a victim, not a recipient, of stolen information.”  Continue Reading »

No responses yet

TBR News July 17, 2016

Jul 17 2016

The Voice of the White House

Washington, D.C. July 17, 2016:”The Turks, always arrogant and violent, have seized an Amerian air base in Turkey and are using this to order the American government to deport a Turkish religious leader whom their dictatorial president dislikes and who claims instigated the failed military revolt recently put down by force. The Turks are walking on a soda cracker bridge and it is starting to rain. They have alienated the Russians and now they are ordering the US government to obey them. The Achilles Heel of Turkey lies in her conflicts with their Kurdish population. The Kurds represent 25% of Turkish population and are organizing for a separatist movement. Turkey will not allow this and, true to form, are murdering Kurdish civilians in a most brutal manner and destroying their villages. An outside entity has been clandestinely arming the Kurds and much more will be heard about this in the coming months.” Continue Reading »

No responses yet

TBR News July 16, 2016

Jul 16 2016

The Voice of the White House

Washington, D.C. July 16, 2016: “Fanatics never think about the future, only the present. By their recent spate of mass murder in France, Sunni IS is unifying, not breaking, Western resistance to their Saudi-supported dreams of religious empire. IS does not consider their own death tolls but in the end, the American and Russian attacks on them, both in the Middle East and soon, in Europe, will destroy them, just as Genghis Kahn destroyed the Assassins in their mountain lairs.” Continue Reading »

No responses yet

TBR News July 15, 2016

Jul 15 2016

The Voice of the White House

Washington, D.C. July 15, 2016 “The international communities with large Muslim populations have been secretly meeting to agree upon corrective steps to deal with the

growing problem of fanatical Sunni Muslim terrorism aimed at the Christian communities. The commission is called ‘Energy Control Commission’ and its members are: The United States, India, the United Kingdom, Sweden, Denmark, France, Germany, Ireland, Switzerland, Austria, the Netherlands, Belgium and Italy.

Russia is now being considered for membership.

This commission has been secretely meeting on a monthly basis in Copenhagen since July of 2006. Its sole purpose is to address the flood of potentially dangerous Muslims into Western countries.

A good deal of intelligence material has surfaced in which telephone and internet communications between various Muslim activist groups point very clearly to deliberate infiltration of non-Muslim countries with the double goal of overwhelming the native populations with numbers and threats of physical violence.

Activist Muslim groups are strongly anti-Christian and are most especially vindictive towards any country that has engaged in military action against any Muslim country. The United States is considered a prime target for infiltration and domestic terrorism while Great Britain, Ireland, Sweden and France are also high on activist terrorist lists.

The general agreement between all parties is that Muslims cannot remain in basically Christian countries because of their often-stated desire to not only take over these countries by population increase but also by the on-going threat of terrorism. Once the final plans for the expulsion of Muslims from member countries, a country will be  opened up as a designated ‘Country of Welcome’ and when this happens, mass deportations of Europe, and America’s, Muslims will begin.

This Islamic Diaspora will be implemented by a joint team of multi-national military personnel using aircraft and shipping that has already been allotted.” … Continue Reading »

No responses yet

TBR News July 14, 2016

Jul 14 2016

The Voice of the White House

Washington, D.C. July 14, 2016 “I know nothing about the so-called K2 imitation marijuana but the sheepies will try anything.

They all rush to text message, Twitter, gabble like mindless geese on Facebook and ignore the ruthlessness of living.

Heroin pure will kill so it has to be cut. If it isn’t, the user is dead with the needle still in the vein.

Regular pot has no such problems.

That having been said, governmental agencies are in support of legal pot because they can regulate its growth and make huge money taxing it.

I well recall the ’60s when half the population staggered around, glassy-eyed and torpid.

“Stoners” we used to call them.

Sat around in very shabby apartments with orange-crate furniture mumbling to each other.

Too spaced out to work, they would steal from garbabe cans to survive.

Electronic toys have replaced pot to a large degree and the new Stoners spend half their time playing key-punched games.

Unemployment (over 25%!) is upon us so the fascination with the world of electronic escapism is rampant.

“Too lazy to work; too stupid to steal” is what we used to call the sheepies.

The so-called ‘for profit’ ‘universities’ and ‘colleges’ deliberately shove ‘student loans’ off on legions of those who attend their business ventures.

These loans, thanks to the crooked Clinton, cannot be discharged in bankruptcy so the student will never be free from large monthly payments.

And the interest on these loans always builds, month by month.

I wonder how much pay off Clinton got under the Oval Office desk?

The students are told about the Golden World that exists just outside the institution of lower learning and the student is assured that with a degree in advanced bird watching, they will be welcomed upon graduation with screaming hordes of employers waving frantically at them.

Of course the schools know this will never happen so PhDs are scrubbing tables at Taco Bell and living at home with Mom and her cat.

But there will not be Stoners because even pseudo chemical pot costs too much.

They end up dumpster-diving.

With an army of 30 million Mexican and Central American illegals packing the countries’ job market, an army willing to work for $2.00 an hour without complaint and off the corporate book, the mortar-boarders are shit out of luck.

But just down the street lurk new electronic toys and other thrilling distractions so the unwashed and semi-literate masses shuffle onwards towards infirmity and the edge of the quarry.” Continue Reading »

No responses yet

TBR News July 13, 2016

Jul 13 2016

The Voice of the White House

Washington, D.C. July 13, 2016: “Our dear friends the PRC people have been told by the Permanent Court of Arbitration that their occupation of Pacific islands belonging to other countries is illegal. True to form, the Chinese have given the finger to the rest of the world and threatened everyone in sight with their displeasure. The Chinese hate Trump because he has stated his intention that if elected president, he will force the large number of American businesses now making their products in China (for cheap prices and depriving millions of Americans jobs) to return to the United States. Also, the PRC has been actively considering getting Russia and the United States involved in military activity against each other so China can move up into Russian Siberia and take it over. They want to do this because China is now an ecological disaster. Her rivers are heavily polluted and drying up and in the north, the Gobi desert is moving slowly toward Beijing and blanketing that city with blinding clouds of dust. Grabbing the land of others is an old Chinese custom.” Continue Reading »

No responses yet

TBR News July 12, 2016

Jul 12 2016

The Voice of the White House

Washington, D.C. July 12, 2016: “We recently got an advertisement for an anti-Trump bumper sticker.

I have an even better bumper sticker.

It is in red letters on a white background and it says:

‘Hillary is a dyke’

I had the original, official State of California state police report on her mattress polkas when she was connected with the Oakland Black Panthers (she worked for Bob Treuhaft who represented them) and in a moment of intense pleasure, I gave it to my neighbor who is a friend of Trumps.

The Trump staff were most happy with the original report (which will come into play later) and I gave my friend, who owns a factory, 200 of my bumper stickers for his employees to put on their cars.

When Jerry Brown, a Jesuit seminary reject, ran for governor of California the first time, I had 5,000 bumper stickers printed up and given away.

This one said:

‘Brown for Queen’

The Brown people were livid but the truth always hurts.

So does a strap-on.” Continue Reading »

No responses yet

TBR News July 11, 2016

Jul 11 2016

The Voice of the White House

Washington, D.C. July 11, 2016: “It is interesting to read the Internet news sites and see the propaganda at work. The liberal media praises Hillary, though here campaign is bogged down under allegations of misconduct. They hate Trump and do their best to attack him at every opportunity. The Russians, on the other hand, are far more subtle and much more effective. RT began to report the killing of black citizens by the police some time ago. When we first read these, it occurred the reporting might be incorrect so a check on the Internet disclosed that this reporting was not correct. Then the liberal Guardian picked up the stories and began to highlight them and now we have seen the results in the Dallas attack. If these perceptions of anti-black violence by the police are not corrected, serious civic unrest before the election will most certainly happen.” Continue Reading »

No responses yet

TBR News July 10, 2016

Jul 10 2016

The Voice of the White House

Washington, D.C. July 9, 2016: “Returning from a long trip, we find our mailbox filled with interesting comments and several important contributions. The attached document is the most outstanding one. It runs to a total of 75 pages and we are publishing it in sections. A number of readers have expressed a desire to communicate with Dr. Harry von Johnston and we had someone search the Internet for a contact point. We were given a telephone number and told that this was a contact point and that it was found on the Internet. We have never met Dr. von Johnston and his postings are sent in via a European site. Here is the number: 706 782-4398. Read on!

Domestic Military Control in the United States

An important 2016 position paper

via Harry von Johnston, PhD

What is the role of the military?

While military forces may be the most visible sign of U.S. military involvement, especially in the early phases of an American domestic counterinsurgency, they should  play a supporting role to the political and economic initiatives designed to enhance the effectiveness legitimacy, and authority, of the sitting government.

Establishing a secure environment for these initiatives is normally a primary objective of military forces and can take many forms.

This can be a minimal requirement to support pro-sitting government supporters with advisors and equipment or it can mean a large scale- commitment of U.S. forces to carry out the preponderance of operations.

In addition to providing a secure environment, U.S. military forces may also be called upon to support infrastructure development, provide health services, conduct police functions, or directly target insurgent cells.

Given the wide range of potential military contributions, it is imperative that all military personnel understand how their actions and decisions must support the overall campaign design to de-legitimize the domestic insurgency in the eyes of the population. Significantly, successful counterinsurgencies are normally measured in years or even decades and require a unity of effort across the spectrum of U.S. agencies.

ARMY SPECIAL OPERATIONS FORCES

Within a joint force, ARSOF assets (less PSYOP and CA units) are ordinarily attached to and under OPCON of a designated joint special operations task force (JSOTF) commander.

The special operations command and control element (SOCCE) assists the JSOTF commander in fulfilling the supporting or supported commander responsibilities. A SOCCE is based on a special forces operational detachment-B and is augmented with a special communications package and personnel as required. It may include a ranger liaison officer, PSYOP and CA representatives, and special operations aviation personnel. The SOCCE is normally collocated at corps level and above, with smaller liaison teams operating at division level and below. The supported unit provides the SOCCE administrative and logistic support.

The SOCCE is the focal point for ARSOF coordination and synchronization with conventional forces. At corps level, the SOCCE coordinates with the corps operations center, fire support element, deep operations coordination cell, and battlefield coordination detachment to deconflict targets and operations. It provides ARSOF locations through personal coordination and provides overlays and other friendly order of battle data to the fire support element and battlefield coordination detachment. The SOCCE can exercise C2 of designated ARSOF units when the JSOTF commander determines the need.

………..

Internet usage for domestic control purposes

1 Internet access can be controlled or its use directed according to the server configuration, thus creating an excellent disinformation weapon.  In previous times, a national media report that was deemed to be offensive or problematical to the government could be censored, or removed at governmental request. Now, however, the government cannot control the present Internet in the same manner in which it has previously controlled the public media. The Internet permits uncensored and unfiltered versions of events, personalities and actions to be disseminated worldwide in seconds and the so-called “blogs,” chat rooms and websites are almost completely uncontrolled and uncontrollable. This unfortunate situation permits versions of events to find a far wider and far more instantaneous audience than the standard print and, to a lesser degree, the television mediums ever could.

  1. The Internet can be used to send coded messages that cannot be interdicted by any government or law-enforcement agency. If man has devised a code or protection program that is supposed to be unbreakable, it is axiomatic that another man can break it. Even the DoD’s algorithmic field codes were easily broken by the Russian GRU during the initial stages of the Iraqi war and it is now known that CIA/USIA codes were also broken, allowing hostile entities to read Top Secret messages. In unfortunately many cases, individual computer experts are more skilled than their counterparts in the government and while, indeed, their encryptions can be broken, they can only be done so by exerting a great deal of effort and when this happens, new encryptions and firewalls can be almost instantly reerected.

3.The Internet can be utilized to steal and disseminate highly damaging, sensitive government or business data. Although highly sensitive official websites are routinely put under strict control, it seems that intruders always seem to succeed in breaking into them. Once this has happened, highly sensitive, and even damaging, information can, and has, been removed and put out on the Internet without any form of control

4.The Internet permits anti-government groups or individuals with few resources to offset the efforts of far larger, and far better funded, government and its national media sources. This is known as the ‘David and Goliath’ syndrome and is a subject of constant concern to all government agencies. Hitherto secure systems can be broken into, information can be extracted or the site (s) can be infected with malicious viruses and destroyed. All it takes to do this is a relatively inexpensive computer, programs that unfortunately are available to individuals seeking them. The best and most effective manner to deal with this kind of threat is the dummy site, designed to lure potential dissidents into joining with it. Skillful questioning of new members has been known to develop important leads to be followed up by conventional law enforcement methods.

5.The Internet can be used to create serious disruptions of governmental agencies and the business communities. It is known that certain dissidents, either as individuals or as groups, have developed devastating computer viruses. These viruses, which are capable of destroying large banks of computer information, both governmental or business. These rumors are very persistent and it is strongly believed that they exist as a dormant entity that can lie concealed in a target system until activated by some kind of a trigger mechanism.

  1. The Internet can serve as an excellent tool for organizing groups of anti-government individuals. (Redacted)
  2. The Internet can be used to expose government actions and military operations in advance of said actions. The immense proliferation of Internet sites has made it possible for adverse elements to break into hitherto secure systems, extract highly sensitive information and either supply it to foreign intelligence agencies such as the Russian SVR or the Israeli Mossad or simply to either publish it or mail it out. A discussion of foreign-based official U.S. computer hacking can be found elsewhere and this study deals solely with ad hoc domestic dissidents.
  3. The Internet is capable of hiding the identities of those launching attacks on the actions and personnel of various government agencies. (Redacted)

9.The Internet can materially assist an underfunded, anti-government group to raise money for continued operations. The use of such firms as PayPal facilitate the relatively secure transfer of money. Again, although it is possible to pressure such firms officially, if one agrees to cooperate, it is only a matter of time that this information will be leaked. We have once had excellent cooperation from SBC, ATT and AOL in conducting overview of millions of system users but lawsuits and Internet activists have published this information, rendering this valuable cooperation null and void.

10.The Internet can be utilized to locate and publicize the personnel of government agencies. It is routine practice in the CIA to have the DoS Passport Division issue official U.S. passports to our operatives working outside the country in names other than their own. The discovery of the real names of the passport holders could result in this material being maliciously posted on the Internet and this could not only subject the agent to serious compromise in the country they are operating in but can also subject them to local exposure and often contempt and harassment.The Internet is capable of limiting the risk of identification of the members of anti-government groups. The FBI, which is responsible for overview and action against counter-terrorism inside the United States. With the advent of the Internet, identification and penetration of anti-government groups has proven to be nearly impossible. The main cause of this failure is due almost entirely to the Internet which has proven a haven for dissidents of all kinds. Given that all domestic telephone calls and all Internet email is readily available to various domestic law enforcement agencies, it is still a monumental task to track and identify possible activists and other anti-government individuals or groups. We have assisted in setting up dummy anti-government sites, peopled them with professionals and provided them with almost-believable information to post for the purpose of establishing importance and also in disseminating disinformation. Persons viewing these sites can readily be identified and tracked, Further, we have an ongoing relationship with several information sites, such as Google, and whenever any viewer seeks information on subjects we deem as potentially negative, this information is automatically forwarded to the concerned agency.

  1. The Internet, while impossible to control, is also an excellent recruiting ground for sympathetic or easily-convinced “bloggers” who will quickly disseminate official dissemination for pay or public acclaim. It is invaluable to distract the public from questioning various governmental actions, both domestic and foreign. For this reason, our organization, and others, have “disinformation” centers that prepare information of a sensational nature which is then released to paid sources who, in turn, disseminate it onto the Internet. The purpose of this is to create a cloaking movement that will point the curious into innocuous areas. As a case in point, it was imperative to prevent the public sector from looking too deeply into the origins of the 9/11 attacks. To prevent exposure of the actions of members of the top levels of government in this attack, many stories were released, over a long period, to the public through wholly-controlled sites. Claims of devious plots, mystery methodologies, and often laughable conclusions have proven to be extraordinarily effective in constructive diversion. The collapse of the WTC buildings have been attributed to Thermite bombs, clouds of plasmoid gas and other nonsense but a very gullible American public has easily swallowed all of the fictions. As another example, the DoD has always under-declared its casualty rates in Iraq and Afghanistan because a full accounting could easily lead to public discomfiture and resulting action.

13.The Internet can be utilized to create an atmosphere of fear or of compliancy in furtherance of official policy. This is a particular ploy that worked very effectively during the two Bush administrations. A constant, on-going threat of vague “terrorist” actions inside the United States was material in gaining, and keeping, public support for the actions of the aforesaid administration. However, it must be noted, that threats must occasionally be proven to be true or too many “duds” tend to dull the public sense and, if continued, will lead to disillusion and anger. ……..

. (to be continued) Continue Reading »

No responses yet

TBR News July 9, 2016

Jul 09 2016

The Voice of the White House

Washington, D.C. July 9, 2016: “Returning from a long trip, we find our mailbox filled with interesting comments and several important contributions. The attached document is the most outstanding one. It runs to a total of 75 pages and we are publishing it in sections. A number of readers have expressed a desire to communicate with Dr. Harry von Johnston and we had someone search the Internet for a contact point. We were given a telephone number and told that this was a contact point and that it was found on the Internet. We have never met Dr. von Johnston and his postings are sent in via a European site. Here is the number: 706 782-4398. Read on!

Domestic Military Control in the United States

An important 2016 position paper

via Harry von Johnston, PhD

Domestic insurgencies date to the earliest forms of government and will continue to exist as long as the governed harbor grievances against authority that they believe cannot be resolved by peaceful means.

What is a domestic insurgency?

The Department of Defense (DOD) defines domestic insurgency as “an organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict.” Simply put, a domestic insurgency is a struggle between a non-ruling group and their ruling authority. Domestic insurgents use political resources, to include the increased use of the media and international opinion, as well as violence to destroy the political legitimacy of the ruling authority and build their own political legitimacy and power. Examples of this type of warfare range from the American Revolution to the previous situation in Iraq. The conflict itself can range from acts of terrorism to the more conventional use of the media to sway public opinion. Whatever form the insurgency takes, it serves an ideology or political goal.

Current motivating factors for potential domestic insurgency in America

Some of the motivating factors in the current politico/sociological situation are:

Massive and continuing unemployment in all levels of American business and industry. Only those who are technically proficient, i.e. in fields of computer science, are employable. Another point of contention is the huge influx of illegal foreign immigrants and the perception that these prevent Americans from obtaining work and also are perceived as draining the national welfare rolls. Also, a growing functional illiteracy in the American public, which has sharply diminished the reading of newspapers and increased the popularity of the Internet with its brief “sound bites.”

A growing public perception of both disinterest and corruption on the part of National and State legislators has caused massive disillusionment on the part of the people. The recent revelations that the American (and foreign) public is closely watched and spied upon by governmental organs at the behest of the President has created a very volatile and very negative attitude towards any and all official programs.

An insurgency is defined as an organized movement aimed at the overthrow of a constituted government through use of subversion and armed conflict. It is a protracted politico-military struggle designed to weaken government control and legitimacy while increasing insurgent control. Political power is the central issue in an insurgency.

Each insurgency has its own unique characteristics based on its strategic objectives, its operational environment, available resources, operational method, and tactics For example, an insurgency may be based on mass mobilization through political action or the FOCO theory. Insurgencies frequently seek to overthrow the existing social order and reallocate power within the country.

The goal of an insurgency is to mobilize human and material resources in order to form an alternative to the state. This alternative is called the counterstate. The counterstate may have much of the infrastructure possessed by the state itself, but this must normally be hidden, since it is illegal. Thus the counterstate is often referred to by the term “clandestine infrastructure.” As the insurgents gain confidence and power, the clandestine infrastructure may become more open, as observed historically in communist regions during the Chinese Revolution, in South Vietnam after the North Vietnamese 1972 Easter Offensive, and in Colombia in the summer of 1998.

Successful mobilization provides active and passive support for the insurgency’s programs, operations, and goals. At the national level, mobilization grows out of dissatisfaction by some elite members with existing political, economic, or social conditions. At the regional level, members of an elite have become marginalized (that is, they have become psychologically alienated from the system), and have established links with followers by bringing them into the counterstate. At the local, district and province-levels, local movement representatives called the cadre address local grievances and do recruiting. The cadre gives credit to the insurgent movement for all local solutions. Loyalty to the insurgent movement is normally won through deeds but may occur through appeal to abstract principles. Promises to end hunger or eliminate poverty may appeal to a segment of the population, while appeals to eliminate a foreign presence or establish a government based on religious or political ideology may appeal to others. Nonetheless, these promises and appeals are associated with tangible solutions and deeds.

What are the root causes of a domestic insurgency?

For a domestic insurgency to flourish, a majority of the population must either support or remain indifferent to insurgent ideals and practices. There must be a powerful reason that drives a portion of the populace to armed opposition against the existing government. Grievances may have a number of causes, such the lack of economic opportunity, restrictions on basic liberties, government corruption, ethnic or religious tensions, excessivly large number of illegal immigrants, especially those from Central America who clog national welfare rolls and are perceived to take jobs from entry-level Americans,or an unassimilitable religious and ethnic minority such as the Muslims who are seen to harbor domestic terrorists. It is through this line of thought or ideal that insurgents attempt to mobilize the population.

Counterinsurgency

What is counterinsurgency?—DOD defines counterinsurgency as “those military, paramilitary, political, economic, psychological, and civic actions taken by a government to defeat insurgency. Also called “COIN” The United States government intends to use a wide breadth of national capabilitie to defeat any domestic insurgencies through a variety of means. The Central Intelligence Agency (CIA) and Department of Justice (DOJ) and the Department of Homeland Security (DHS) use special teams to generate strategic objectives and assist the sitting government. The military will support those efforts by employing conventional forces, in combination with Special Operations Forces (SOF), in a variety of activities aimed at enhancing security and/or alleviating causes of unrest.

(to be continued) Continue Reading »

No responses yet

« Newer - Older »