The Killer Boss – Markus Wolf – The Movie

Advertisements

EXPOSED – U.S. Army Threat Tactics Report: North Korea

The Korean peninsula is a location of strategic interest for the US in the Pacific Command (PACOM), and many observers note that North Korea is an unpredictable and potentially volatile actor. According to the Department of Defense in its report to Congress and the intelligence community, the DPRK “remains one of the United States’ most critical security challenges for many reasons. These include North Korea’s willingness to undertake provocative and destabilizing behavior, including attacks on the Republic of Korea (ROK), its pursuit of nuclear weapons and long-range ballistic missiles, and its willingness to proliferate weapons in contravention of United Nations Security Council Resolutions.” Some of the latest evidence of irrational behavior is the elevation of Kim Jong Un’s 26-year old sister to a high governmental post late in 2014, the computer hacking of the Sony Corporation supposedly by North Korea during late 2014 over the possible release of a film that mocked Kim Jong Un, and the April 2015 execution of a defense chief for allegedly nodding off during a meeting. Over the past 50 years, North Korea has sporadically conducted operations directed against its enemies, especially South Korea. These actions included attacks on South Korean naval vessels, the capturing of a US ship and holding American hostages for 11 months, the hijacking of a South Korean airline jet, electronic warfare against South Korean signals including global positioning satellites (GPS), and assassinations or attempted assassinations on South Korean officials including the ROK president. The attempted 1968 Blue House Raid by North Korean elite military personnel resulted in the death or capture of all 31 infiltrators involved in the assassination attempt as well as the death of 71 personnel, including three Americans, and the injury of 66 others as the North Korean SPF personnel attempted to escape back to DPRK territory.

The purpose of this North Korean Threat Tactics Report (TTR) is to explain to the Army training community how North Korea fights including its doctrine, force structure, weapons and equipment, and the warfighting functions. A TTR also identifies where the conditions specific to the actor are present in Decisive Action Training Environment (DATE) and other training materials so that these conditions can easily be implemented across all training venues.

Executive Summary

North Korea is an oligarchy with Kim Jong Un as its supreme leader.
The DPRK is a militaristic society with about 1.2 million active duty personnel in uniform out of a population of 24 million with another 7.7 million in the reserve forces.
All military personnel serve under the umbrella of the Korean People’s Army (KPA); the Korean People’s Air Force (KPAF) and Korean People’s Navy (KPN) primarily support the KPA ground forces.
The KPAF focuses on homeland defense and close air support to the KPA.
The KPN’s primary mission is to protect the North Korean coastline and support the KPA special purpose forces (SPF) in mission execution.
Much of the equipment in all military branches is old and obsolete, but the KPA has concentrated its modernization efforts on missile technology that may provide the means to successfully launch a nuclear warhead.
North Korea possesses a nuclear weapon and is modernizing its missile fleet in order to increase the attack range for its nuclear arsenal.
North Korea possesses both chemical and biological weapons.
The KPA practices both passive and active camouflage to hide its units, headquarters, and other important resources from the air.

Weaknesses

Although the North Korean military may feature some positive attributes as a fighting force, the KPA also suffers from many weaknesses as well. Much of the military’s equipment is old and obsolete. The North Korean military consciously refuses to rid itself of any equipment and still operate tanks that date back to World War II. This wide range of military hardware from many generations of warfare also generates logistical issues. The KPA’s supply personnel must not only find the spare parts for a large variety of equipment, the KPA maintenance personnel must be well-versed in the repair of a great assortment of vehicles and weapons. In addition, the DPRK lacks the logistical capability to support the KPA beyond a few months. Due to the shortage of fuel and the cost to operate vehicles for a cash-strapped country, many of the KPA soldiers find themselves involved in public works projects or helping farmers bring in their rice crops. Any time spent in non-military support is less time that the KPA soldiers can spend training for combat. Even the mechanized and armor forces, due to resource restraints, spend much of their training time doing light infantry training instead of mounted operations. While KPA soldiers may be well trained in individual skills or small unit tactics, the amount of time spent on larger exercises pales in comparison to most Western militaries. Without adequate time and resources to practice large scale military operations, the KPA will always face a steep learning curve when the KPA is forced to perform them in actual combat for the first time.

The DPRK’s unorthodox use of provocation in order to obtain concessions from its enemies—especially the US, South Korea, and Japan—is a danger. One never knows what North Korea will do next as, in the past, the DPRK has sanctioned assassination attempts on South Korean political leaders and conducted bombings when South Korean contingents are in another country, unannounced attacks on ships by submarines, unprovoked artillery attacks, or has tunneled underground into another country. US military personnel stationed in South Korea must be prepared for the unexpected from the DPRK.

One of these incidents could ignite the Korean peninsula back into a full-blown war. While an armistice has been in place since 1953, an armistice is just a ceasefire waiting for a peace treaty to be signed or for the resumption of hostilities. Any conflict between North and South Korea would inevitably bring the US into the conflict as the ROK has been an ally for over six decades.

North Korea’s possession of nuclear weapons and the missiles to transport it up to 9,650 km makes it a threat to US forces stationed in Korea, Japan, Alaska, or even the west coast of the continental United States. Even more concerning was the DPRK’s first successful test launch of a KN-11 missile from a submarine on 23 January 2015 since, in the near future, the North Korean submarines could silently move closer to their targets before launching a nuclear missile that would give the US less warning time. If the DPRK thought that the survival of its country or the Kim regime was at stake, North Korea might use any nuclear weapons at its disposal. The KPA also possesses chemical weapons and its doctrine calls for their employment. The DPRK is also involved in biological weapons research and would likely use those with offensive capabilities. US military personnel training for deployment to South Korea must be prepared to fight in a chemical, biological, or nuclear environment.

 

Chemical Splash and Spray Attacks Potential Tactic for Violent Extremists in Homeland

We evaluate that fear based oppressors likely view strategies including tossing or showering acids and an assortment of compound fluids, henceforth alluded to as a synthetic shower and sprinkle assault (CSSA), as a feasible strategy to cause damage and disturb basic framework, in light of open source revealing depicting psychological militant online networking posts and fear monger and brutal radical utilization of this strategy abroad. An examination of few episodes portrayed in media announcing uncovered that CSSAs are regularly utilized by criminal performing artists to facilitate criminal exercises and by fierce radical gatherings abroad to make fear, scare, rebuff, and distort people and gatherings that oppose their control or belief system in their general vicinity of operations; the strategy, in any case, has once in a while been operationalized by on-screen characters in the Country. We note, in any case, that homegrown savage radicals (HVEs) and solitary guilty parties likely would discover this strategy engaging and could without much of a stretch adjust it to the Country, as it requires no particular specialized ability and the materials regularly connected with criminal assault are typically unregulated and generally accessible.

(U//FOUO) We evaluate that revolutionary fanatics, other residential fear based oppressors (DTs), and criminal on-screen characters are the probably US-based brutal radicals to utilize CSSAs in light of our examination of over a significant time span DT utilization of this strategy and on open source revealing of unaffiliated criminal performing artists utilizing acids, harmful mechanical chemicals, and other substance crippling specialists in assaults in the Country. They have utilized CSSA strategies against law requirement, foundations, ideological adversaries, dissenters, and mass get-togethers, particularly those related with political or social causes, in light of an assortment of open source announcing. These performing artists once in a while utilized CSSAs to cause fatalities, however past episodes have exhibited that household CSSAs can cause critical substantial damage and upset law authorization and specialist on call operations.

(U//FOUO) While remote psychological oppressor associations (FTO) and brutal fanatic gatherings have operationalized CSSA abroad and have made late calls for such assaults in the Country, we need particular data demonstrating that HVEs or solitary guilty parties would be open to this strategy or would look to fuse CSSAs into assaults inside the Assembled States; we survey, in any case, that huge numbers of the variables likely driving criminal utilization of CSSAs, for example, the capacity to hurt people, cause framework disturbance, perhaps sidestep catch following an assault, or potentially execute rehash assaults—likely would likewise make this strategy appealing to fear based oppressors, particularly fierce radicals lacking preparing, and the entrance or want to utilize explosives or guns.

(U//FOUO) Solid acids and burning chemicals are much of the time utilized as a part of CSSAs, however we evaluate aggressors are similarly prone to pick other monetarily accessible chemicals, for example, pepper splash, blanch, alkali, solvents, and other bothering, putrid, or poisonous mechanical chemicals, in view of the assortment of materials utilized for CSSAs locally and abroad. Specialists on call treating casualties of CSSAs may confront auxiliary dermal and inward breath dangers relying upon the kind of chemicals utilized.

(U) ISIS Desires CSSA in the Country While Rough Radical Operationalize the Strategy Abroad

(U//FOUO) We evaluate that fear mongers likely view strategies including tossing or showering acids and an assortment of compound fluids, in the future called synthetic splash and sprinkle assaults (CSSAs), as a suitable strategy to cause damage and upset basic foundation, based on open source announcing portraying psychological oppressor online networking posts and fear monger and fierce radical utilization of this strategy abroad. An investigation of few episodes portrayed in media detailing uncovered that CSSAs are regularly utilized by criminal on-screen characters to encourage criminal exercises and by fierce radical gatherings abroad to make fear, threaten, rebuff, and distort people and gatherings that oppose their control or philosophy in their general vicinity of operations; the strategy, in any case, has seldom been operationalized by performing artists ihowever, that HVEs and solitary guilty parties likely would discover this strategy engaging and could without much of a stretch adjust it to the Country, as it requires no particular specialized aptitude and the materials frequently connected with criminal assault are normally unregulated and broadly accessible.

» (U//FOUO) The Islamic State in Iraq and slag Sham (ISIS)- connected “Solitary Mujihad” station on the Europe-based informing application Wire, starting late 2017, asked US-based ISIS-supporters to assault “unbelievers” with sulfuric corrosive on open transportation.

» (U) Rough fanatics partnered with ISIS in Iraq and Syria, since in any event mid 2015, were purportedly spreading or tossing corrosive in the characteristics of ladies from the Iraq-based Yazidi religious minority and Kurdish ladies who declined to be sex slaves or submit to constrained relational unions, as indicated by open source announcing. Moreover, ISIS-partnered vicious fanatics freely tormented and executed adversaries, deceivers, and those they regarded n the Country. We note, in any case, that HVEs and solitary wrongdoers likely would discover this strategy engaging and could without much of a stretch adjust it to the Country, as it requires no particular specialized mastery and the materials frequently connected with criminal assault are typically unregulated and generally accessible.

» (U//FOUO) The Islamic State in Iraq and fiery debris Sham (ISIS)- connected “Solitary Mujihad” station on the Europe-based informing application Wire, starting late 2017, encouraged US-based ISIS-supporters to assault “unbelievers” with sulfuric corrosive on open transportation.

» (U) Savage fanatics associated with ISIS in Iraq and Syria, since at any rate mid 2015, were purportedly spreading or tossing corrosive in the characteristics of ladies from the Iraq-based Yazidi religious minority and Kurdish ladies who declined to be sex slaves or submit to constrained relational unions, as indicated by open source detailing. Moreover, ISIS-associated rough radicals freely tormented and executed foes, double crossers, and those they deemedDEPARTMENT OF Country SECURITY, Insight Combination Focuses

(U//FOUO) DHS Announcement: Substance Sprinkle and Splash Assaults Potential Strategy for Brutal Radicals in Country

December 18, 2017

Synthetic Sprinkle and Splash Assault: Uncommon yet Potential Strategy for Brutal Radicals in Country

Page Tally: 10 pages

Date: September 21, 2017

Confinement: For Official Utilize As it were

Starting Association: Branch of Country Security, Office of Knowledge and Appraisal

Record Compose: pdf

Document Estimate: 313,000 bytes

Document Hash (SHA-256): 1444CB27457B1F56A97A074AD2049034AC63AE457A88FB0F6013C7F480736D09

Download Document

(U//FOUO) We survey that fear based oppressors likely view strategies including tossing or showering acids and an assortment of synthetic fluids, henceforth alluded to as a concoction splash and sprinkle assault (CSSA), as a suitable strategy to cause damage and disturb basic framework, based on open source detailing portraying psychological militant online networking posts and psychological militant and savage fanatic utilization of this strategy abroad. An examination of few occurrences depicted in media announcing uncovered that CSSAs are ordinarily utilized by criminal performing artists to facilitate criminal exercises and by brutal radical gatherings abroad to make fear, scare, rebuff, and distort people and gatherings that oppose their control or belief system in their general vicinity of operations; the strategy, in any case, has once in a while been operationalized by on-screen characters in the Country. We note, in any case, that homegrown brutal radicals (HVEs) and solitary guilty parties likely would discover this strategy engaging and could undoubtedly adjust it to the Country, as it requires no particular specialized skill and the materials frequently connected with criminal assault are generally unregulated and broadly accessible.

(U//FOUO) We evaluate that rebel radicals, other household fear based oppressors (DTs), and criminal performing artists are the in all likelihood US-based rough fanatics to utilize CSSAs in light of our examination of at various times DT utilization of this strategy and on open source announcing of unaffiliated criminal on-screen characters utilizing acids, poisonous modern chemicals, and other concoction debilitating operators in assaults in the Country. They have utilized CSSA strategies against law authorization, establishments, ideological adversaries, nonconformists, and mass get-togethers, particularly those related with political or social causes, in light of an assortment of open source announcing. These performing artists seldom utilized CSSAs to cause fatalities, however past occurrences have exhibited that local CSSAs can cause huge real damage and upset law authorization and person on call operations.

(U//FOUO) While outside fear based oppressor associations (FTO) and brutal fanatic gatherings have operationalized CSSA abroad and have made late calls for such assaults in the Country, we need particular data showing that HVEs or solitary wrongdoers would be open to this strategy or would try to join CSSAs into assaults inside the Assembled States; we survey, be that as it may, that a significant number of the variables likely driving criminal utilization of CSSAs, for example, the capacity to hurt people, cause foundation interruption, conceivably dodge catch following an assault, and additionally execute rehash assaults—likely would likewise make this strategy appealing to psychological militants, particularly vicious radicals lacking preparing, and the entrance or want to utilize explosives or guns.

(U//FOUO) Solid acids and scathing chemicals are every now and again utilized as a part of CSSAs, however we evaluate assailants are similarly prone to pick other economically accessible chemicals, for example, pepper shower, fade, alkali, solvents, and other chafing, putrid, or lethal modern chemicals, in light of the assortment of materials utilized for CSSAs locally and abroad. People on call treating casualties of CSSAs may confront optional dermal and inward breath perils relying upon the kind of chemicals utilized.

(U)

 

Countering Terrorist Narratives

This investigation, dispatched by the European Parliament’s Arrangement Division for Subjects’ Rights and Sacred Issues at the demand of the LIBE Panel, gives a review of current ways to deal with countering psychological oppressor stories. The first and second segments layout the distinctive reactions created at the worldwide and European Union levels. The third segment introduces an investigation of four distinctive ways to deal with reacting to fear based oppressor stories: disturbance of publicity conveyance, divert technique, crusade and message outline, and government correspondences and synchronization of message and activity. The last area offers various arrangement proposals, featuring five interrelated ‘lines of exertion’ basic to amplifying the proficiency and viability of counterterrorism and countering fierce fanaticism key correspondence.

1. Worldwide activities to counter fear based oppressor accounts are completed by various distinctive on-screen characters on the supranational, global, local, national and sub-national levels. The UN has set up itself as a key player in the field of counter-stories, rousing related organizations, for example, the Worldwide Counterterrorism Gathering (GCTF) and Hedayah, to help states in building solid designs of activity in this field. Other worldwide associations, for example, NATO and OSCE, have executed activities that attention on vital interchanges and counter-stories. States have likewise expanded endeavors in countering fear based oppressor stories through participation with different states or non-state institutional accomplices. At last, tech organizations have found a way to counteract manhandle of their stages by fear based oppressor on-screen characters.

2. The EU has expected a main part in counter-account endeavors through its own particular offices and projects and in addition through supporting outside activities. Europol assumes a key part in expelling illicit psychological militant substance from the Web while the EU Web Gathering gives a stage to disturb fear monger content and open up counter-accounts. The EU likewise encourages a system of cutting edge specialists, the Radicalisation Mindfulness System, which gives investigations of existing counter-account endeavors. At last, there are various establishments working at the European level, frequently in association with either the EU or Part States, which encourage the making of counter-accounts between governments, industry, and common society.

3. There are four key patterns in current endeavors to handle fear monger purposeful publicity:

I. Interruption of promulgation circulation – The key goal is to meddle with the conveyance of publicity, to put it plainly, to attempt and stop purposeful publicity at the source by keeping it from achieving its intended interest group. Specifically, this has focussed on bringing down promulgation from web-based social networking and erasing affronting accounts.

ii. Divert technique – Instead of eradicating promulgation, this approach looks to divert watchers to various messages trying to ‘bump’ their conduct. Spearheaded by Jigsaw and ISD, this venture diverts those scanning for jihadist material to counter-informing.

iii. Crusade and message outline – These tasks look to give data and aptitudes to Common Society Associations (CSOs) to create correspondence battles, normally in light of counter-story or option account approaches. While interruption looks to stop the spread of purposeful publicity, this approach tries to empower CSOs with the aptitudes to stand up to and undermine the promulgation.

iv. Government correspondences and synchronization of message and activity – There is a propensity for correspondence crusades to be composed in a vacuum, detached from occasions, in actuality. Synchronization approaches take a thorough point of view and intend to connect messages and activities, and to arrange informing crosswise over government and with global accomplices. The quality of these methodologies is to keep the undermining of a story by uncovering its ‘say-do-hole’, through guaranteeing message and activities are adjusted, and through constraining opposing informing.

4. In spite of the fact that counter-accounts is broadly bolstered by governments, think tanks and NGOs, the idea itself is somewhat immature and does not have an exhaustive establishing in observational research. There is little proof to help the adequacy of counternarratives and a significant number of its hidden presumptions have been raised doubt about. There is a requirement for more noteworthy research here and, specifically, compelling observing and assessment of flow counter-account extends keeping in mind the end goal to have the capacity to guarantee that lessons are found out.

5. Counter-psychological oppression (CT) and countering vicious radicalism (CVE) vital correspondences endeavors crosswise over different projects and activities can be educated by the accompanying suggestions:

I. Interruption of fierce fanatic material should be connected extensively and over various stages, keeping in mind the end goal to abstain from dislodging fear monger informing movement between channels. The vacuum made by interruption should be loaded with a progression of messages intended to use a scope of motivational drivers, keeping in mind the end goal to resound with an intended interest group subject to changing inspirations and so as to have a strengthening total impact on that gathering of people.

ii. To guarantee cognizant informing over the short, medium and long haul, battle and message plan standards should be synchronized through the foundation of a reasonable and easy to-comprehend, larger focal account, which is upheld by a specifically assorted exhibit of messages.

iii. An unmistakable recognizable proof of the intended interest group is essential to successful key correspondences, considering a range of potential customers of the message (expected, unintended, supporters, enemies and neutrals). A nuanced behavioral and attitudinal comprehension of that group of onlookers is expected to powerfully shape mentalities and practices.

iv. Measuring the viability of vital interchanges requires appraisals that emphasis on measures of key education, specialized proficiency and target gathering of people. These appraisals should be at first performed preceding the beginning of a key interchanges exertion to build up a standard measure. Once the benchmark measurements are set up, these evaluations should be consistently executed as a way to check the viability and proficiency of the battle after some time.

v. So as to pick up put stock in, believability and authenticity according to an intended interest group, informing should be synchronized with exercises on the ground, in this manner diminishing the apparent uniqueness between what one says and does (the ‘say-do hole’). The focal necessity for enhancing the synchronization of informing and activity crosswise over organizations is to a great extent social. Antiquated states of mind that ‘activities talk louder than words’ add to a hierarchical culture, frequently strengthened by principle, which bears vital interchanges an ex post facto part in operations, procedure and arrangement. Vital correspondences ought to be a key thought in arranging from the earliest starting point of the

iii. A reasonable distinguishing proof of the intended interest group is key to viable vital correspondences, considering a range of potential buyers of the message (planned, unintended, supporters, foes and neutrals). A nuanced behavioral and attitudinal comprehension of that gathering of people is expected to powerfully shape mentalities and practices.

iv. Measuring the adequacy of key correspondences requires evaluations that emphasis on measures of vital education, specialized proficiency and target group of onlookers. These evaluations should be at first performed preceding the beginning of a key interchanges exertion with a specific end goal to build up a benchmark measure. Once the benchmark measurements are built up, these appraisals should be frequently executed as a way to check the adequacy and productivity of the battle after some time.

v. Keeping in mind the end goal to pick up put stock in, believability and authenticity according to an intended interest group, informing should be synchronized with exercises on the ground, in this manner lessening the apparent dissimilarity between what one says and does (the ‘say-do hole’). The focal prerequisite for enhancing the synchronization of informing and activity crosswise over administrations is to a great extent social. Antiquated states of mind that ‘activities talk louder than words’ add to a hierarchical culture, regularly strengthened by precept, which bears key interchanges an ex post facto part in operations, procedure and arrangement. Key correspondences ought to be a key thought in arranging from the earliest starting point of the

 

Advertisements

BERND PULCH, STASI LIST, KGB LIST, STASI LISTE, LIVE SEARCH, SECRET LIST OF ALL OFFSHORE COMPANIES, OFFSHORE INDONESIA, OFFSHORE, MALAYSIA, KGB PUTIN, BDVP, STASI IM WESTEN, STASI FUEHRUNGSOFFIZIERE, TOXDAT, GOMOPA, COMMUNIST DATABASE, DOWNLOAD, STASI-LISTE, KGB LISTE, STASI PUTIN, TOP SECRET – BERND PULCH – The Naked Truth

Advertisements
%d bloggers like this: