John Spencer is an award-winning scholar, professor, author, combat veteran, and internationally recognized expert and advisor on urban warfare. He served over 25 years in the U.S. Army to include two urban-warfare centric combat deployments to Iraq. He can be found on twitter @SpencerGuard
Here you find a transcript of the CIA file titled 'A Study of Assassination'. This
unsigned and undated (estimated publication date: Dec 31st, 1953) 19-page
typewritten file was part of a collection of CIA documents pertaining to
Operations PBFORTUNE and PBSUCCESS and was declassified under the
Freedom of Information Act on May 15, 1997.
After years of answering Freedom of Information Act requests with its
standard "we can neither confirm nor deny that such records exist," the CIA
has finally declassified some 1400 pages of over 100,000 estimated to be in
its secret archives on the Guatemalan destabilization program. An excerpt
from this assassination manual appears on the Op-Ed page of The New York
Times on Saturday, May 31, 1997.
ADP 3-90, Offense and Defense, articulates how Army forces conduct the offense and defense. It contains
the fundamental tactics related to the execution of these elements of decisive action. Tactics employs, orders
arrangement of, and directs actions of forces in relation to each other. Commanders select tactics that place
their forces in positions of relative advantage. The selected tactics support the attainment of goals. Tactics
create multiple dilemmas for an enemy allowing the friendly commander to defeat the enemy in detail.
Successful tactics require synchronizing all the elements of combat power.
ADP 3-90 is the introductory reference for all Army professionals studying the art and science of tactics. The
five chapters of ADP 3-90 focus on the tactics used to employ available means to prevail during large-scale
ground combat (in the offense and the defense), and they constitute the Army’s collective view of how it
conducts prompt and sustained tactical offensive and defensive operations on land. All tactics require
judgment in application. This publication is not prescriptive, but it is authoritative. ADP 3-90 standardizes
the lexicon commanders’ use to describe the conduct of offensive, defensive, and supporting enabling
operations. It focuses on the employment of combined arms in combat operations.
Full credit to Nutnfancy on YouTube. Go check out his stuff, go fund his Patreon, his work is important.
This video is older, but a classic. The wisdom is true, and I strongly recommend everyone watch it. The YouTube algorithm buries it, which is a shame, so I'm uploading it here to preserve it.
Published by the UN.
Protection of United Nations personnel and facilities is one of the three core tasks for the FPUs. This main task can include protection of convoys, relocation or evacuation of staff and intervention where necessary for the protection of staff and in accordance with FPU capabilities.
Close protection and VIP escorts for the benefit of the United Nations, international or national officials have been and are currently provided in several peacekeeping missions.
It appeared that very often, the units were not prepared for this type of mission and were directly involved in operations without any previous experience or competence.
FPU members directly tasked with VIP protection should act according to the UN Manual of Guidance on Protective Services and in close cooperation with UN security/UNDSS representatives. This manual is intended to be a resource for protection officers and to provide a standard terminology and doctrine for such deployments, to ensure a consistently high standard of protective services, including close protection operations, within the United Nations.
By MICHAEL WARNER
Cyber technologies and techniques in some respects originated in the intelli-gence profession. Examining cyberspace operations in the light of the history and practice of technology helps illuminate both topics.1 Intelligence activities and cyberspace operations can look quite similar; what we call cyber is intelli-gence in an important sense. The resemblances between the two fi elds are not coincidental. Understanding them opens new possibilities for exploring the applicability of intelligence concepts to a growing understanding of cyberspace.
This essay outlines the current counterinsurgency model, with an emphasis on its
domestic application in the United States. It shows that many contemporary
counterinsurgency practices were developed by police agencies inside the U.S.,
and illustrates the transfer of theory, strategy, and technique from domestic
police to the military - and back. The essay also examines the state's use of nongovernmental
or nonprofit agencies, as one element of counterinsurgency
strategy, to channel and control political opposition. The conclusion briefly
considers the strategic implications for social movements, especially as we learn
to recognize and respond to political repression.
Know thy enemy.