Meanwhile, self-righteous liberals in Congress are demanding communist-style re-education camps for conservatives, and their goal is to silence any opposition to their plans. Their spin is that they’re doing it to preserve democracy by eviscerating the Constitution.
OK, we were disenfranchised, and now we’re in a protracted battle with the Deep State. So, the question is, how can we of the people, make a noticeable difference without being canceled, demonetized, de-platformed, injected, inspected, detected, infected, neglected, and selected?
We did it during the American Revolution. Colonists climbed up trees with their longrifles and made a noticeable difference because they focused on righteous targets – British officers.
Today’s Patriots can do the same as individuals, or as far more effective self-forming and stealthily, Patriot Cyber Strike Teams (PACSTRIKE).
For those itching to get some, here is a way for you and like-minded others to open a new front in The Great War to End All Slavery.
Patriot Cyber Strike Teams (PACSTRIKE)
Today’s Patriot battlefield is considerably different from that of The American Revolutionary War (1775 to 1783.) China started this one with a strategic biological cyber-attack on America.
With this in mind, I’ve created the hit-and-run cyber, electronic sniping strategy featured in this article for Patriots who wish to take action.
It is based on my Silicon Valley Internet security consulting experience combined with what I learned during my many business trips to Russia in the 1990s. What I see today is that PACSTRIKE battlefields span social media comment threads and everywhere else the Globalist propaganda machine operates on the Internet.
How we fight back matters. But climbing up a tree with a Kentucky Longrifle is no longer physical; it’s virtual. Likewise, the targets are very different, but for the same reason.
In 1776 it was to disrupt enemy operations and lines of communication, and the targets were British officers. American marksmen were very good at sending them back to their maker.
British field officers were noble targets, whereas the targets of today are ignoble. They are paid, Deep State operatives, A.I. bots, and useful idiots, and such, and the most righteous targets are disinformationalists in the employ of the Globalists.
Their personalities typically are akin to those of petty retail clerks. To help paint a face on most of them, try to visualize a disgruntled middle-aged man with a bulbous red nose who does it for vodka, child support, prostitutes, and the thrill of hurting innocent people.
Disinformationalists are the most righteous targets because you’re hitting the hitters, and these foul creatures are not rocket scientists. They follow a playbook that makes them predictable, and this is a crucial PACSTRIKE advantage.
Then there are the A.I. bots, trolls, and shills. It may feel good to rant at them online, but that is amateurish thinking because all you’re doing is painting a bullseye on your head. Your risks will be high and your returns marginal.
Always remember eventual victory is not absolute, and we’re up against mean and vengeful people with long memories and heavy fists. This reality is why the first step in being effective is to do it smartly.
Patriot Cyber Strike Teams require a disciplined approach because they must operate in target-rich environments with effective stealth and cyber combat tactics. In essence, teams will use the Globalist’s playbook against them and strike like ghosts, quickly retreating into shadows.
Why We Fight
We’re told to “trust the plan,” but no plan ever survives first contact with the enemy. So it is more about trusting a plan that is in motion. No wonder some wonder if the Alliance, Trump, Q, the Anons and the Patriots are part of a Deep State PSYOP (Psychological Operation). Ergo, they exist to suppress open rebellion to facilitate a non-violent communist takeover of America.
That may sound a bit over the top, but March 2021 will be the first anniversary of COVID Communism craziness, so what’s over the top anymore?
What if this PSYOP allegation proves to be accurate? Our only hope will be the North Korean model for self-protection. Say nothing and always look down.
Worse yet, if you love freedom, your worst threats will be those closest to you. Such is the communist model. In this “new normal,” everything you say to friends and family can eventually make its way to the attention of a devoted socialist educator or minder.
After that, there will be a loud knock on the door. Then as you are being chained to the floor of a FEMA prison train for the sake of democracy, the state is sweeping up your children.
PEOPLE, THIS IS WHY WE FIGHT!
But don’t take my word for it. If you live in a large city like San Francisco or San Jose with a large Russian immigrant community, ask them. In the early 90s, I taught ESL for Russian immigrants for two years, and I know what they’ll tell you, “OMG, It’s 1917 all over again.”
With this in mind, here is what I observed during the 1990s, with ESL students, and as a tour operator, specializing in the former states of the Soviet Union.
Shortly after the fall of the Soviet Union, I answered the call to action of our State Department and became a tour operator specializing in independent travel to Russia.
In my travels, I met hundreds of Russian socialists, and frankly, the ugliest socialists I’ve ever encountered in all my years are Americans. Why is this?
After a dozen trips to Russia over eight years, I came to understand why communism captures the people and then inevitably fails them. Here is what I learned.
The Communism Bell Curve
Imagine communism as a bell curve. It rises quickly with early adopters, peaks at its height of power, and then collapses once the mainstream is exhausted with the lies and abuse.
On the front end of the curve, Americans and the Democrat party are filled with revolutionary fervor. They know it never worked for the 25 countries that have tried it and failed, but they believe they can get it right this time. Hence, they’re leading a large minority of Americans on the left into the early adopter phase of the communism bell curve.
They’re on the wrong side of the curve, and this is why it is impossible to have a constructive conversation with them. If you think that’s over the top, go ask the innocent folks in Portland who lost their lives, businesses, reputation, and hope thanks to so-called “peaceful protesters.”
Meanwhile, with Biden in the White House, everyone on the left is on the curve’s upside. Hence, these early adopters of communism are drunk with self-righteous power. Their newfound sense of mob power and the ability to abuse and terrorize those who refuse to bend a knee are as addictive as crack cocaine.
The longer you cling to the hope that you can reverse this power lust mob programming with sound logic, facts, and tolerance, the more naïve you are.
Here in America, it will be the same as the fall of the Soviet Union. People will self-awaken or not, and to this very day, Stalin is still Russia’s all-time best leader. Much in the same way, American Neo-Nazis revere Hitler and deny the Holocaust.
Therefore, if this communist takeover of America by the left continues unabated, what will happen after our nation reaches the top of the communism bell curve?
At the top of the curve, the only way to survive will be to say nothing and look down. Worse yet, the disenfranchised that are alive when that happens will all die as slaves and numerous generations after that. That’s how it works, and our nation is shooting upwards to the top of the curve.
We, Patriots, need to stall the curve because we can help disrupt the Globalist cancel propaganda. If you love God and the Constitution, starting a PACSTRIKE Team is a way to get some skin in the game with stealthy software tools. And best of all, they’re free!
From this author’s viewpoint, the three most useful PACSTRIKE tools are VPN, anonymous browser, anonymous email accounts, and an anonymous search engine. Your goal is to move like a ghost through the Internet, and your first and most important tool will be a VPN if possible.
A Virtual Private Network (VPN) conceals the physical whereabouts of your device from Internet web servers. Only the VPN knows where you are, and there are many excellent vendors. I use Goose VPN.
It is important to note that VPNs require router permission. They’re ideal for when you are using your hardline Internet service account with someone such as Spectrum cable or AT&T, for example. However, if you are using a public Wi-Fi connection, the owners can configure them to block VPN access.
Portable Operating System
After you get your VPN, download a copy of the Tails portable operating system. You load this OS from a thumb drive and it protects against surveillance and censorship. It leaves no trail. A nice piece of software to have.
The Tor browser is a free anonymous browser and installs on popular platforms. It is ideal for profiling disinformationalists and the military uses it for pretty much the same reason.
You can download Tor directly and quickly install it yourself. It is advisable to have it installed on every device you own and plan to use. Here are three simple rules to keep in mind when browsing for PACSTRIKE missions.
- Never Browse From Work: Business router software can track everything you’re doing, and this kind of outside activity can be seen as grounds for dismissal.
- Never Use Shared Devices: Keep your loved ones out of it. Never use a shared family P.C. Only use personal devices you own and control and secure them like concealed firearms.
- No Bluetooth Devices: Bluetooth devices have a short operational range and can be compromised. Only use hardwired devise connections.
After installing the Tor browser, you need to configure it with an anonymous search engine, which will also work with other popular browsers such as Firefox.
If you prefer using the Google, Bing, or Yahoo search engines, the relevant question is why? Typically, it is because you’re getting search results optimized for your online profile.
These search companies track your history, and these data records are voluminous. They build the profiles for two reasons. The first is to sell your profile data to anyone who’ll show them the long green. The second is to keep you captive by pandering to your personal preferences.
Instead of returning objective search results based solely on your search string, they use your online profile to slant the search results, so you keep getting more of what you like. Ergo, it is simple for them to shape your information environment without you knowing it.
Say, for example, you’re using Google (the worst offender) for your searches. What happens is that each time you click a mouse, Google learns something new about you. Not good.
For this reason, the only search engine I use is DuckDuckGo.com. Interestingly enough, this is the best search engine for use with low-speed connections.
To see why take a Pepsi taste challenge so to speak. Begin by going online with a low-speed Internet connection and enter a search string with Google. Then see how long it takes for the results to display.
When you enter the same search string with DuckDuckGo.com, you’ll be amazed at how much faster it returns the results. And no, it is not because it is defective or incomplete or any other such nonsense. Instead, it is faster because it is not spying on you.
All this brings us to the next step. I call it hiding in the shadows.
Throw-Away Email Accounts
After you have Tor and DuckDuckGo configured and ready for use, enter the search string “anonymous email” to get started because you will need several throw-away anonymous email accounts. Review all the options and decide on where to create your email accounts.
What I observed with paid Globalist disinformationalists operating out of the Crown (a city-state in the center of London) is that they typically acquire several of them at one time. They prefer Microsoft for throw-away email accounts and create about ten in a batch and leave them dormant until needed.
When naming your temporary accounts, the prefix (the name preceding the @ symbol) needs to follow non-sequential patterns.
Yes, it may feel good to use clever names such as firstname.lastname@example.org, but it makes it easy for the bad guys to profile you. It’s better to be a free ghost than a profiled Patriot.
A good way to begin is with a password generator for creating dissimilar email address prefixes such as 8Gsfd3@. There are free password generators online.
After doing all this, you will have a basic software strategy in place with the necessary tools. Trust me; this is only a starting point. From here, you will wake up to a whole new world of possibilities, and we’re not going to be specific about that.
But to wet your beak, here is one example, TeamViewer.
You have most likely needed online manufacturer support, and they used a remote access program to take control over your computer via the Internet. For those who tend to favor the Whack ’em All arcade approach to solving software issues, remote access is a blessing.
Likewise, for exasperated support techs, remote access is a universe better than having to ask, “Do you have a ten-year-old in the house?” These commercial programs are expensive, but one company, TeamViewer, offers a free private use version.
If every member of your PACSTRIKE team has this installed, you have two big advantages. Each team will likely have one or more super users, and these members will help the less advanced users, such as setting up new programs, running upgrades, etc.
This alone is an excellent reason to use TeamViewer, but my favorite for this purpose is that the program is that it allows for direct machine-to-machine file transfers. What does this mean?
Let’s assume you want to send a large file such as a disclosure video directly to another team member through the Internet.
If you attach it to an email, it will get there, but it will be temporarily cached in several places in a chain of email servers in the process. There is no reason to risk exposing your identity this way when you can bypass all this and go directly from one machine to another.
All of the software tools mentioned above are free and well-supported, and I strongly urge you to donate to these wonderful groups in support of their vital work.
This brings me to the final software tools point. When you pull together a team, get a geek, and two is better. What’s the benefit? If you want to take this to the next level, you’ll want your geeks to build PACSTRIKE longrifles for the team.
When I first became the target of disinformatialist wolf packs back in 2007, I worked with a few old friends from my Silicon Valley consultation days to see if we could piece together a profile. Here is what we found.
While you would think they operate in some kind of James Bond setup, this was before the widespread personal use of VPNs, and at the time, they worked from coffee bars and libraries and other sites within the Crown.
The Crown is a Globalist city-state situated in the center of London. As the Vatican City in Rome, they are worlds unto their own. Ergo, we fought the British during the American Revolutionary War, and we’re fighting them one more today. Sigh… some things never change.
By using remote anonymous Wi-Fi locations, disinformation and propaganda operatives can access the Internet without being traced to a physical address such as a home or office. In support of that strategy, they also use dedicated laptops to conduct cyber-attacks.
Well, it’s “sauce for the goose,” as they say, and so the diligent use of the software and access rules discussed above will be sufficient for most, but for those who want to step up to a more level playing field, it’s time to build your own, inexpensive Kentucky longrifle laptops. Since there is some great history here, let’s take a moment to review it.
During the American Revolutionary War, Patriots were sniping at the British when land battles were fought with the “Brown Bess” muskets. These smooth bore muskets were roughly fifty percent accurate at a range of 100 yards, and at ranges of 200 to 300 yards, the odds dropped below twenty-five percent.
This technology-driven European style of warfare was brutal. Soldiers had to march in formation and stand their ground as enemy volleys of musket and artillery fire thinned their ranks. When Americans fought that way, they often learned a hard lesson. The British were brilliant at it, and we were not.
To balance that unequal equation, Americans answered with stealth and technology.
American sharpshooters climbed up trees with their longrifles a.k.a. Kentucky rifle. Instead of a smooth bore, it had a rifled barrel, and for the average American infantryman, it was highly accurate to a range of 100 yards. In the hands of expert sharpshooters, it was deadly up to 300 yards.
Their targets of choice were British officers, which brings us to the critical point as to why these snipers were so effective. It was not that they could strike suddenly from beyond the effective range of a Brown Bess musket, though that was important.
By sniping British officers from at a standoff distance, they effectively disrupted British ground operations, thereby diminishing their effectiveness. The same holds today.
Your longrifle is a dedicated laptop, and your strategy is stealth. Use these tools to confront useful idiots and liberal shills and trolls, and you’re another yutz waiting to be profiled. Instead, if you are inspired by our snipers of 1776 and aim for righteous targets.
Hit the mark, and you will disrupt Deep State propaganda operations. Sure, it’s like a drop of water in the ocean, but then again, what is an ocean, but a vast collection of drops. So, here is the first drop.
Go to a computer store that sells used laptops and get a used Windows computer and pay cash. It will likely have an older copy of the Windows O.S., and like all other versions, it will have NSA backdoors built into it. Here is where you keep using Tails, but now you’re upping the game from mere protection to penetration.
To get started, have your geek perform a fresh install of Kali Linux with an installed copy of the Tor browser. This is a great penetration O.S. and free. If you are an experienced P.C. user, you can download it directly and do it yourself. The key is to hose Windows off the C drive with a fresh install. There is no point in using an O.S. with built-in NSA back doors for this application.
Next, uninstall the drivers for the built-in microphone and webcam and cover the devices with bits of black tape. Then assign one of your anonymous email addresses to your longrifle laptop. Use it for software registrations and nothing else.
Also, buy a carry bag for your longrifle laptop. Never carry it exposed in the open, but rather, keep it in the carry bag when moving about.
Now you’re ready to get your desktop organized and learn Linux. Next up, what kind of ammo are you putting into it? As, in, what are you going to say and to whom. In the fight for freedom, here is where the rubber meets the road.
PACSTRIKE Battle Tactics
Patriots are engaging disinformationalists, trolls, and shills in comment threats and elsewhere. The problem is, they often pick low-value targets and unnecessarily expose themselves to risk.
While doing this, no doubt feels good; it’s also foolish and naïve. On the other hand, the smart approach is best summed up by General George S. Patton. “The object of war is not to die for your country but to make the other bastard die for his.”
Here is a hard truth about the Normies in your circle of friends and family. They are the enemy because this is how they have been indoctrinated with a communist view of you and your stupid fascination with staying free. Accept it and deal with it, as in, they have no need to know.
In fact, outside of your team, the need to know is still the guiding rule. For added measure, these decisions need to be decided by the whole team.
Here is another truth. Operationally, there is no difference between artificial intelligence and Normies. Programming is programming, and here is the good part. You deal with both in the same way. As I like to say, you “Let them eat vacuum,” which begins with nouns.
Profiling your activity online occurs in several ways. The most common is your drill-down path. By the seventh click on a website, they may not know your name yet, but they’ll know your gender, approximate age, preferences, and financial status.
The point here is that surveillance relies on discernible patterns. For example, it only takes five points on your face to surveil you. Not only are they establishing patterns to identify you through facial recognition and website drill down patterns, your language and how you identify yourself offers Globalists a treasure trove of profiling information against you.
Today, a widespread practice among the Q community and conservatives at large is memes. The artificial intelligence programs used to profile users cannot parse them, and so they have become a powerful way to message the cause.
Does this meme advantage translate to language as well? Yes, and here is how to do it, starting with nouns and triggers.
Nouns, Pronouns, and Triggers
When I review Patriots’ posts in comment threads, I see them use a mix of proper nouns and personal pronouns.
- Proper noun: Refers to people and to things that exist physically
- Personal pronouns: g., I, you, he, she, we, us, them.
In answering disinformationalists, shills, and trolls, proper nouns, e.g., Trump, election fraud, and Q are used profusely. Worse yet, are the personal pronouns. e.g., I, you, he, she, we, us, them. They dominate our conversations, and so we take them for granted.
For PACSTRIKE Teams, proper nouns and personal pronouns are the kiss-of-death because, with communist programming, pronouns trigger Normie cancel attacks. Whether they are vocal, physical, or both, these are always explosive and vitriolic. Avoid them at all costs.
The method is similar to when a salesperson is looking for an emotional hot button to press in the prospect to trigger the desired buy response. However, with a triggered Normie, the goal is not to sell you socialism; it is to personally humiliate you, which is why removing pronouns helps to reduce the risk of a sudden cancel attack.
For this reason, messaging rule number one is to avoid using proper nouns and personal pronouns and substitute them with common nouns: e.g., boy, country, bridge, city, birth, day, happiness, or with none whatsoever.
For example, a Normie friend calls you and says, “Why haven’t I heard from you lately?”
If you answer with something like, “You don’t like Trump, and I do not want to argue with you.” Ouch. You have three pronoun triggers and a proper noun, “Trump.”
For an artificial intelligence program, that’s like throwing your skirt over your head and shouting “Yoo-hoo boys” as the fleet sails into port.
Now let’s see what happens when we eliminate the pronouns and the proper noun
Question: “Why haven’t I heard from you lately?”
Answer: “Sorry, terribly busy these days.”
Yes, the example contains a milk toast answer, and that is what you want. No triggers. Less is more.
What is the point of all this? Prideful bravado, as I “Here I am you pukes, come and find me” is just that. This kind of stupid, pointless, prideful bravado may be fun, but it accomplishes little or nothing in terms of disrupting enemy operations.
The point here is that you never attack the messenger personally. You only attack their behavior and messaging.
After profiling your targets, you only attack elements of their message and their behavior. With this in mind, let’s get into target profiling.
For many of you, this may sound arrogant, but everything you know about profiling is wrong. Think about it. What pulls you into an emotional answer? It is the content of the attack message. Ergo, Anger, and ego outbursts are what disinformationalists want and what artificial intelligence programs actively seek.
Yet, people keep rewarding them, and why are they successful at it? They have a playbook, and here is the good news.
The man who introduced me to Sweeney’s work in 2008 was a former British intelligence officer. At the time, I was mercilessly hounded by Globalist disinformation wolf packs operating out of The Crown in London. They were beating me like a drum, and this was my first rodeo.
It was an awful time, and thankfully, he took pity on me. He gave me links to Sweeney’s work and advised me to implement a “tar baby” strategy. To post and promote articles that explain how to profile them and to counter their propaganda attacks.
Wow. Wow. Wow. Did it ever work, and it was as simple as schoolyard rules. When everyone wants to see who is getting an ass-whuppin’, namely myself, they will visit Yowusa.com, and the first they’ll see is my Sweeney tar baby.
Why call it a tar baby? Because once newbies came to see who is getting an ass-whuppin’ they realized that I’m an honest seeker of truth, and many of them stayed. This tar baby strategy flipped the attacks in my favor and increased my audience numbers by over 25%.
Once the disinformation wolf packs saw this happening, they knew I had comprised them, and they moved off target. Mind you, that was not the end of it.
Eight Traits of the Disinformationalist
While technology changes, human nature remains and the Eight Traits of the Disinformationalist is just as accurate today as it was 20 years ago. The traits Sweeney describes are:
- Artificial Emotions
- Time Constant
When I began ignoring the messaging and focusing on behavior, I began to see the world of disinformation from the inside out, and trust me; this is a huge advantage. Then there is the obvious question. What do to about it?
Twenty-Five Ways To Suppress Truth
What Sweeney explains in Twenty-Five Ways To Suppress Truth, is how to carry out effective propaganda counterattacks.
However, when Sweeney wrote these articles, artificial intelligence was still a somewhat futuristic concept. Twenty years later, A.I. is a new reality, and so I will update Sweeney’s recommendations and examples accordingly.
For example, let’s use number nine, Play Dumb.
No matter what evidence or logical argument is offered, avoid discussing issues except with denials they have any credibility, make any sense, provide any proof, contain or make a point, have logic, or support a conclusion. Mix well for maximum effect.
Example: Nothing you say makes any sense. Your logic is idiotic. Your facts nonexistent. Better go back to the drawing board and try again.’
Proper response: ‘You are avoiding the issue with disinformation tactics. You evade the issues with your own form of nonsense while others, perhaps more intelligent than you pretend to be, have no trouble with the material. Why do you refuse to address the issues by use of such disinformation tactics (rule 9 – play dumb)?’
Here is an example of how I would reword the “Proper response” from above:
Proper response for A.I.: This post avoids the issue with nonsense while more intelligent readers have no such trouble with the material. The programming of this bot refuses to address the issues by use of such disinformation tactics.
This amended response also adds another element to the attack. I call it “Bot Branding.” Regardless of whether you know you’re dealing with a human disinformationalist or an artificial intelligence program does not matter.
Either way, you attack the A.I. because the programming of the A.I. will likely not anticipate this kind of attack. Better yet, if it is a human disinformationalist, the yutz will have to out him or herself or move off target. No matter how it plays out, you’ve disrupted the enemy’s propaganda operation with little or no risk to yourself.
Now it’s time to kick the tires and light the fires with strategy.
PACSTRIKE Team Strategy
The best way to make a small fortune in the stock market is to start with a large one. This is why many people who dabble invariably lose money. That’s entertainment. Lose in this game, and nothing is entertaining about it.
If you want to succeed in the stock market, start with paper trades. Pretend you’re placing buy and sell orders on paper and then track your progress. At some point, you’ll figure out what works and what hurts. Then you’re ready to ante up with the real stuff.
PACSTRIKE teams need to follow the same strategy. There is no rush. Instead, organize your team, your tools, and your methods first. Then study the battlefield and learn how to profile your righteous targets. Slow and steady and hold the course. Get cocky, and they’ll whack you.
When your teams go into action and hit the hitters, always swarm them, but never be repetitious or predictable.
Instead, analyze their posts and then see how many of the Sweeney responses you can use. Then divvy them up amongst the team, load your longrifle laptop for bear, and happy hunting.
Let me share with you one final piece of advice on how to phrase responses. After you write them, print them out. Then pretend you’re sitting in the witness box, and the prosecutor says, “And what did you mean with this post.”
Just answer, “It speaks for itself,” and say no more.
Again, remember that loose lips sink ships which is why you must always work on a need-to-know basis because while there are no absolute ways to protect yourself, the most effective of all is common sense.
Believe in God; believe in yourself; believe in the future, and dare to say no!