Tuesday, December 30, 2014

Planning Personnel Protection.

it's about optimizing protecting tactic.

it's about preventing killing in early phase.

leader of security team is responsible for planning security operation.

team leader has to ensure that every member of security team is fully prepared for protecting, understands tasks, has equipment, understands correspondence laws, understands alarm signals.

planning consists of phases:

1. information gathering.
- gathering information about protected personnel,
- public opinion gathering: research, intelligence & counterintelligence (counterobservation),
- reconnaisance in places visited by protected personnel, determining danger points, observations of protected places.

2. analysis of gathered information.
- selection of important informations, neccessary for selection of general plan, concept.
- efficiency of analysis depends on information gathering - factors, systematicity of a gather & information transmission, agents cooperation & gathered materials sharing, possibility of gathering informations by agents. this implies that phase 2nd is intertwined in time with phase 1st.

3. selecting general plan, concept.
- general planning of security operation, initial work,
- 'Planning Leader' is responsible for devving general plan, concept, for tasks harmonogram for each of his/her security men or women & of task requests for other involved forces. he or she is responsible for each of security links in each of protection operation phases. depending on moment, team will use different methods. situations include, for example: intrusion of unknown undesired people, information about bombing threat, failure of a transport car (recent news inform about threat of cars being hacked in future), etc... more details in book mentioned in footer.

4. selecting forces & tools.
- determining personnel & equipment neccesary for security operation,

while determining forces & tools, we should pay attention for:
- region, personnel & tools there,
- evacuation ways, travel ways, safe places, medical personnel & infrastructure available,
- weapons of personnel, support outside (even a 'lonely bodyguard' can call 'the Police') & more,
- transportation available,
- communication tools,
- diet, food & drinks,
- rest & sleep for security,
- protections against fire-starts,
- safe store for documents & more.

for details see book mentioned in footer.


5. presenting graphical plan of security operation.

it's not about 'erotic image marketing' of the plan, but i'll elaborate as much as i think i have to,

i know i understand only a little.

it's graphical presentation of security plan, concept prepared by Planning Leader himself or herself.

plan should be compedium of knowledge associated with security tasks & reflect all orders of both each of security teams & each of security agents individually (personnel).

topographical maps of distrcits & streets should be used, as well as architectonical plans of buildings, terrain, canals.

for marking people, objects, security outposts there are varying symbols used.

exemplary plan (more or less perfect) shoud include:
- general assumptions about protected personnel & tasks,
- task description,
- program, visit's schedule,
- data about protected personnel & associated people (age, blood group, etc),
- general situation description, based on program,
- concept (how to realize, identifiers, transport paths),
- tasks for each of teams, for each of people involved,
- transportation / security data (amount, types, equipment),
- communication security (codenames of personnel, diagrams, code tables),
- arms / weaponry report used by security personnel,
- general situation information & profilactics (general advice based on intelligence),
- general equipment report,
- media security information report,
- information security report (hacking support, cryptography, perhaps more),
- residence security report (secured places for staying),
- security personnel distribution report (where who is, who is doing what),
- exceptional situation handling (what to do in exceptional situations as program change, delays, blocked transportation route, etc.),
- dangerous situation tactics (bombing clue, attack with weapons, etc.),
- medical list (hospitals near operation area, medical personnel available).

example of team structure:

Team Leader.
- Planning Leader.
 - Agent of the gathering (responsible for information gathering team).
  - Intelligence agent.
  - Intelligence agent.
  - Counterobservation operative.
 - Analyst.
 - Technical support operative.
  - Supplies operative.
  - Transportation operative.
  - Communications agent.

(to be elaborated later perhaps, if it's needed & if i can).

-- Paraphrased from 'Taktyka działań ochronnych. Ochrona osób.' by Jarosław Kaczyński.
-- i've translated & paraphrased as well as i could & understood. it's best to buy book.
-- i've added a little of my opinion as well.

Saturday, December 27, 2014

Killer Characteristics.

Who is potentially killer?

based on research it's mostly males:

- small posture,
- disintegrated family,
- without father, or without feelings toward father,
- born outside national borders,
- shying away from other people,
- without wife, staying away from women,
- without work for 1-3 years before kill attempt,
- no active life,
- identifying with religious or political movement,
- considering their deed 'just' & true to their views.

other researches notice mental ilnesses, sad childhood, sensivity.

'So mad'.

killers often consider themselves martyrs.

'So sad'.

political killer is someone detached from any rational political direction or social doctrine.

'So detached, so bad'.

-- Paraphrased from 'Taktyka działań ochronnych. Ochrona osób.' by Jarosław Kaczyński.
-- i've translated & paraphrased as well as i could & understood. it's best to buy book.
-- i've added a little of my opinion as well.

Thursday, December 25, 2014

6 - Tiered path to Victory.

insights tell me of Tactics for Problem Solving.


a way of True Warrior, for it includes:

- Truth which joins not separates (Staying True to Your Love, Honesty),
- Way of the Warrior who defeats himself & enemies.


i am not too sure of this path, feel free to criticize & correct.

use this Tiered path or not at Your own risk.


---

Path to Victory:

1. 'Know Yourself, Know Enemy'.

it's an apex of Tactics (most exhaustive method, most ambitious).

my main Enemy is Ego.

i do not want to be dick to those i Love, so i need to defeat that dick of Ego as much as i can.

See: Elaboration.


2. 'Know Your Way, know the Ways'

Once Your knowledge of Your Way is perfect & unshakeable, You can start to learn about Enemy's Ways.

Learn Politics, Learn who is Ally, who Enemy - think, but do not deny orders even if it seems that You do.

Be ready to explain Your apparently treasonous behavior if this occurs.

SKILLFULLY apply the ways, even false Tiers against Enemies, as well as Tests for Allies.

This tactic is not easy.

Not everyone is ready to follow it, nor should be allowed to walk this path by her or his superiors.


3. 'Know the Ways, know the Way'.

Learn nuances of behaviors & ways - true or false, strictly follow orders as You gain skills & knowledge.

Skillfully apply the ways, even false Tiers against Enemies.

Do not experiment too much.

This tactic is not easy.

Not everyone is ready to follow it, nor should be allowed to walk this path by her or his superiors.


4. 'Know The Forces, know the Way'.

Learn about Allies as well as about Enemies as You can, but follow orders strictly.

Help or Support Allies, perhaps Enemies as well if it's not a treason, if this helps them change & is not risky for ours.

Do not experiment at all.

This tactic is not easy.

Not everyone is ready to follow it, nor should be allowed to walk this path by her or his superiors.


5. 'Know Your Forces, know the Way'.

strictly follow orders, support or help the Allies as You can.


6. 'Know Yourself, know "the Way"'.

it's basicly following orders without thinking.


---

7th tier: 'Know the Tiers'.

it is knowing which tier to use when.

it's learned by experience.


i think i can follow Tiers 3-6, also Tier 1 in dire need but it's dangerous & risky.


as i will.


Tiers 3-4 are dangerous, it's useful to use Tier 5 mostly, Tier 6 only when extremely exhausted - otherwise it's laziness.

Tier 6 is also for those under suspiction, and can be enforced by superiors.


---

False Tiers:

they are leading to the loss of You & Your Love:

1. Know the Money, know 'the Way'.

way of traitors taking bribes.

it's not part of '6 - Tiered path to Victory', but we should be aware of it as well:
- to be wary of them & to Protect ourselves & ours,
- to use against Enemies if / when we can.


---

See also, if You wish: Programmer's 6 - Tiered path to Victory.

Programmers can hack, or program robots to fight, perhaps.

Image is thankfully from computer game only, but these 'military drones' are robots that can be programmed by qualified personnel (Ada Programming Language, i think, mostly).




Robot Hack.

Wednesday, December 24, 2014

Tactical use of a ssh backdoor.

Not all computers are the Internet enabled or can be accessed via the Internet without extra 'care'.

i am not expert but i think.

If a tactical team goes to a site with computer, they can:

1. Connect target computer to the Internet.
2. Install a backdoor to let rest of the forces play with it as they need - obtaining information, hacking, using.

it's categorized as 'Tactical Pendrive Assault', i think.

'You can play, it's the way'.

Assault leads to close combat phase of attack, melee.


useful things to have:

1. A pendrive with Kali Linux, with ssh software as part.
2. USB device that connects computers to the Internet, or similar.
3. A practice in installing ssh backdoor really quick - in few minutes or under. ('few' is two to five).

extras (in case of team needs):

1. USB Camera.
2. Other USB devices.
3. Perhaps more.

See also: Teamwork.

Article author's note:

Foreseeing development of USB Security / Encryption in future as well. We should support.


-= Reality is NOT as in Computer Games. See: Teamwork =-.





Tactical Hacking. Is there USB port available?
If not, cables should be cut with a knife, & USB port connected.
Computer's intestines butchered.

(or a proper screwdriver / other tools used if possible).




'Disengage', disable Enemy's Defensive Perimeter.




pretty bad, destroyed hq ...



---




Computer's intestines.
Visible books:
- Grammar of Polish Language,
- Geometry with Linear Algebry script (MIMUW),
- Intensive Introduction to Hacking.
Visible cds:
- Hacking Multimedia Courses,
- Matrix Film,
- perhaps cds with drivers.
Invisible (on photo) books:
- Rootkits. Invisible Electronic Sabotage.
- Have Electronics & other books as well.

Killings.

to Protect, one has to know & understand killers & their motives (the 'Know Enemy' doctrine).

i am not sure if it's history that creates killers, or the other way around - probably both.

there's insane potential of destruction in every human.

every leader attracts attention and is target of possible killers who attempt to bypass security rings around them, to outmaneuver forces that protect, in the attempt of to kill leader.

killer's motives fall into categories that include:
- personal gain, wealth - it's business of the crime, ego play,
- ideological issues - often political groups attack other with special forces that way,
- psychological issues - ambition, 'accusing' someone of imagined or true guilt toward killer.

order givers:
- national agencies.
- criminal organizations.

killers from national agencies have expensive & sophisticated resources, as well as methods.

killers from criminal organizations often use guns, close combat weapons, exploding devices often
self-produced. they select carefully timing, analyze tasks, take time selecting target defining strong & weak points.

i'll skip kill planning description on this blog, to not teach & to not harm.

but i'll mention that victims are observed & analyzed before kill attempt.

'Know Your Forces, Know the Plan'.

Protecting Personnel.

Causes of killings & methods of killers should be investigated, and considered in forming defense, individually for each Protected person.

Depending on Psychical & Physical qualities of protected person, on groups she or he belongs to (Artists, Wealthy people, etc..) attackers can be guessed as well as the methods of attack, at least to certain degree - for there are also unknown factors.

Common qualities as well as differencies should be considered when protecting a group of people. These qualities allow for creation, selection & using of optimal methods of Personnel Protection.

Qualities of Personnel to pay attention for include mostly:

- Emotional relations with society & certain groups within - intensity & types of emotional feelings.
- Amount of time, or perhaps constant time of being in center of attention of society or certain groups within.

Also:

- Behaviors & Causes,
- Relations with people surrounding,
- Position, responsibilities,
- Personality traits as ability to form compromise, to admit committing an error, tolerance to changes in plans & decisions, ability to accept suggestions & help,
- Behaviors at work places, in organizations,
- Self-discipline,
- Relation to security & tactics choices.


-- Paraphrased from 'Taktyka działań ochronnych. Ochrona osób.' by Jarosław Kaczyński.
-- i've translated & paraphrased as well as i could & understood. it's best to buy book.

See also: Teamwork.

Knowing Your Team & it's Methods can also be part of 'Knowing Yourself' as in Know Yourself, Know Enemy, even if You are not a Team's Leader.

'Know Your Forces, Know Your Way'.

Tuesday, December 23, 2014

Know Yourself, Know Enemy.

To defeat enemy in a battle, tactical or not, on small or large scale, one has to:

1. Know & Understand Yourself.

- introspection - looking inside, as in a mirror ... to describe this too precisely would hurt - everyone has her or his own introspection method(s),
- reflection - thinking about oneself, one's tools ... we prefer to not precise again,
- insight - observing mind, thoughts & feelings that appear. meditation, observing breath can be a key.

2. Know & Understand Enemy.

- spying,
- books & training courses,
- investigate causes of enmity & methods,
- analysis & internalisation.

3. Form a Plan.

i think that self-understanding is more important than understanding of opposing force(s).

not sure by how much.

but in truth both should be perfected.

4. Prepare.

- arm Your forces, even if it's only You,
- train, practice.

5. Deploy, if neccesary.

- it's best if victory occurs without battle.

---

it's an abstract post on how to win against enemy of any kind. it's powerful but not easy or pleasant method.

my main enemy is Ego.

i think there are also lesser tactics, less demanding for easier tasks.

should learn them as well - i think it's skillful to do that.

Monday, December 22, 2014

a Dog of a Camera.

Dogs play Important role in Personnel Protection, i noticed in important book about Security of Personnel Tactic.


i think that in hands of trained personnel (programmers, hackers),

USB Camera can be more vigilant than a dog, perhaps with proper training & montage - screwdriwer & tools as extra cables, stands or other solutions are needed,

Computer programs can raise alarms very well, based on USB Camera input.

Computer programs can also handle defense/alarm system automation, perhaps under human personnel supervision.

Computer (or smartphone sooner or later) does not have biological needs or breaks for these, but needs electricity & communication.

Therefore, it is immune to gas attacks & similar. but there are gases that sabotage infrastructure chemically.

Both Computers, as well as Tablets & Smartphones can be programmed & connected to USB Cameras with more or less effort.


i think this can be used Tactically, to support Antiterror.


Dogs of Cameras do not bark, unless connected to 'a computer' that can make that sound somehow.


See also, if You wish: How to turn usb camera into motion sensor.

Security, Tactics, Dangers & Targets.

Who are main targets of attacks?

- Known people: Politicians, Religious Leaders, Artists, Scientists, ...
- Wealthy people,
- People who attest in law courts against criminals,

Who is main danger?

- Terrorists,
- Criminals,
- Psychopatic Killers.

What is Security Operation Tactic?

It's methods of Protection used by security agents, in groups & outside.

- Planning Security Operation,
- Deployment,
- Decisions taken during immediate threat of Protected personnel.

Security Operation Tactic should form subsystem of Antiterroristic Security of a Nation.


Causes of killings & methods of killers should be investigated, and considered in forming defense, individually for each Protected person.

Depending on Psychical & Physical qualities of protected person, on groups she or he belongs to (Artists, Wealthy people, etc..) attackers can be guessed as well as the methods of attack, at least to certain degree - for there are also unknown factors.


-- Paraphrased from 'Taktyka działań ochronnych. Ochrona osób.' by Jarosław Kaczyński.
-- i've translated & paraphrased as well as i could & understood.

Thursday, December 18, 2014

Martial Arts & Tactics.

- is tactic part of Martial Art training?
- i think it can be part of Martial Arts training, part of work on Mind level if You understand Buddhist approach enough.

- will Tactics & Tactical thinking be part of this blog?
- yes, as soon as i can i'll share my thoughts on how Sun Tzu's Art of War, various Martial Art philosophy books & Tactic manuals can be joined into complete system. perhaps at first it won't be perfect, but i'll still post to encourage thinking & discussion. perhaps i'll mention hacking as a tool of obtaining information as well few or several times.

- will i mention Terrorism & Anti-Terror Tactic in this blog?
- perhaps yes. it's dangerous but perhaps can help to combat terror a little. could use inspiration for that. feel free to contact me if something i post is harmful more than it helps - i'll remove as soon as possible, or perhaps reedit.