Monday, August 19, 2013

How They Hunt

08/19/13

I’ve cobbling this entry together between uptime and downtime over the last couple of weeks so bear with me on this one. I think there’s a fundamental misunderstanding of how counter-insurgency intelligence and exploitation systems work so I’m going to touch on them a bit in this entry.  It’s by no means comprehensive as that would take an entire volume to document.  So what I’m going to attempt to do here is give the reader some insight into how an insurgency is identified, exploited, and targeted using a fairly simple and brief scenario.

READ MORE

No comments: