> 5. Operational Risk (PLAY TO WIN, SURVIVE! PLAY THE LONG GAME, TIPPING POINTS TAKE EFFORT AND TIME!!!!)
The fifth principle is operational risk, which stresses the clandestine paradox between conducting operations to gain or maintain influence, relevance, or reach in order to attain the political goals, and long-term survival of the movement.
Operations increase the observable signature of the organization, threatening its survival.
The paradox comes in balancing the risk–winning by not losing.
It is in these terms that the clandestine cellular networks of the underground develop overt fighting forces–rural and urban–to lethally and non-lethally interact with with the target audiences:
- the population
- the government
- the international community,
- and third party countries conducting foreign internal defense in support of the government forces.
This is done to gain moral, physical, and/or cognitive advantage over the counterinsurgents forces and the government by increasing the popular internal support for the movement, as well gain or maintain external support from third party nations or non-state actors.
This interaction invariably leads to increased observable signature and counter operations against the insurgent overt elements.
However, to balance the paradox of operational risk, these overt elements can, given time and resources, be rebuilt. What cannot be rebuilt are the core members, the driving force behind the insurgency, which can be termed the irreconcilables.
These elements stay alive by taking care not to emit any signature that can be detected by the counterinsurgent unless necessary, and making sure that they are compartmented from each other should one be detected.
Frenlys: V for Vendetta is a movie. The Siege lordism must stop. Race-war tipping points are not going to happen with a slumbering and low-morale guilt-subjugated and demoralized white majorities. Freedom is a responsibility. Liberty is a condition which must be constantly managed and cultivated. AKA, it's a job! You gotta work at this to win it and keep it! Remember the founding fathers of America all mostly survived into their old age and died peacefully surrounded by their families, AFTER achieving all their goals and then-some. The Marvel universe is not real! So, SURVIVE! PLAY THE LONG GAME! PLAY TO FUCKING WIN! As other frens have said, we need to win popular support of the population first, that starts with resilient infrastructure. Which not getting killed should be a given.
> 6. Organizational Learning
Lastly, organizational learning is the fundamental need to learn and adapt the clandestine cellular network to the current situation, the threat environment, the overall organizational goals and strategy, the relationship with the external support mechanisms, the changing tactics, techniques, and procedures of the counterinsurgents, technology, and terrain–physical, human, and cyber.
Although the insurgent core and network leaders, and even members, must continually adapt and learn based on these factors, one of the most important clandestine principles is to learn and adapt based on successes and failures of the form, function, and logic of the clandestine cellular network.
Understanding, learning, and adapting to the factors above, including the loss of members, or close calls, allows for the clandestine cellular network to become stronger and more proficient.
Examples of questions that the network leaders and members might ask themselves after any type of attack on the network may include:
- How did this happen?
- How did the counterinsurgents find the member?
- What was he doing when he was detained or killed?
- Who knew he was at the location?
- Were there any odd occurrences before the attack?
- And, what new tactic, technique, or procedures did the counterinsurgent use in executing this strike?
All are pertinent questions that may expose an organizational vulnerability that requires the network to adapt.
Thus, much of the logic of clandestine cellular networks emerges from these principles, and all evolve around the often repeated adage, ―insurgents win by not losing.‖
[Expand Post]
It is for this reason that survival of the movement‘s the core members, or other highly dedicated members that will carry on the fight even if the core is lost, is imperative.
These members must remain largely under the counterinsurgent radar by applying the form, function, and logic of clandestine cellular networks for long-term survival.
–
The insurgents may lose the conventional battle, including all of their overt force, but the organization can and will rebuild upon its core, even if it has to wait for a long period of time for the right conditions to re-emerge.
Insurgent time and western time are not comparable, nor are the insurgent and western ideas of defeat. Defeat of a conventional fighting force in the past may have meant victory, but for an insurgency, it just means a setback.
Defeat against an insurgency also does not come simply by securing the population, as US doctrine promotes, although this is the first step.
The other steps that must take place include isolating the clandestine networks from external support, and isolating the reconcilable insurgents from the irreconcilables.
Frenly Notes: Why do you think they dox us, gangstalk us, censor us, harass us. If they were right about everything, they would allow us to simply speak our minds.
Left for educational purposes (Don't do anything illegal):
>Until these conditions are satisfactorily met, the fight will continue, maybe not overtly, with subversion and terrorism once again emerging as the primary methods of the latent-and-incipient phase, but it will continue, especially for ideologically motivated individuals.
>Victory comes for the counterinsurgent only when there are no more irreconcilables, either through turning them, completely isolating and thus marginalizing them, capturing them, or killing them.
> Why would we need frenly message relays if things are secure, without JavaScript and we're using tor and pgp?
Well, against the glowniggers PGP IS SECURE, if used correctly (air-gapping), but TOR is not 100% secure. The Tor developers make it explicit that tor doesn't protect from a Global Passive Adversary (GPA). Basically if you can TAP the entry, middle-relay and tor endpoint, you can carry out correlation attacks and de-anonymise users at will. Just look up network taps. The tech behind this attack is LOW TECH, cheap and easy enough to make at home. I've run through some numbers, to successfully TAP the world (strategic emplacements + automation), we're talking about less that $250,000 USD in equipment. But what is required is glowniggers IRL tapping things. This is trivial. What do you think the spooks sheep-dipped into all embassies all around the world are doing during peace-time? Mapping and Tapping everything.
Thing's get worse when we're talking about an Active Persistent Threats (APT) You know like when you open up tails in NATO territory at a Starbucks, and you're immediately put under surveillance within 15 minutes of firing up the Tor Connection (Even with Obfs bridges), then you're followed, and later in your absence your hotel room surreptitiously broken into and your drives cloned, and (((THEIR))) firmware installed on the brand new drives you just bought, but you were unaware because they used a heatgun to open the drive packages and reseal them hoping you were nigger-tier-dumb enough to reuse them and give up your disk passphrase. But you had a hidden camera right? Because they were in fact nigger-tier-glowniggers, kek.