Six Resistance

 

The following is a blue print for containing and defeating powerful individuals involved in crimes against humanity.
Resistance Scenario 5pgs
Intro: The US and the world are under threat from elite Army intelligence battalions and others armed with a revolutionary breakthrough in electronic warfare.  These criminals are waging a dirty war of torture and assassination against innocent civilians.  It is impossible to predict the course of events and ultimate outcome of the resistance campaign against men armed with revolutionary anti-personnel weapons.  These death squads have the ability to assassinate anyone anywhere and possibly to stage mass attacks against large scale populations.  Direct military confrontation is not advisable.  Containment of INSCOM is the strategy we will use.  The strategy is to confront INSCOM first and isolate, contain, and cut them off from resupply.  The campaign will advance in three distinct stages or phases.  How fast these stages progress is difficult to say, but events will probably take months.  The perpetrators will use delay tactics and try to wait out the resistance.  The first stage is to inform the public and rally public protest and public outrage and to galvanize politicians to act by using public pressure.  The second stage to is to isolate and contain the main INSCOM perpetrators and their commands by both physical blockade, denial of material support, and political isolation.  If the main personalities attempt to run and hide in other military bases then a red balloon exercise using online social sites like twitter and facebook will be used to track and find them and recommence the isolation and containment.  It is possible that the first two phases may need to be implemented at the same time.  The critical factors are to capture the hearts and minds of the public, and communicate to the perpetrators that they are cut off and alone without material resources to continue their secret dirty war.  The third stage is to turn opposition figures into friendly assets by protecting them and their families and using monetary rewards to compel their cooperation.  A bottom up strategy uses local and state police to avoid a top down cover up.  The procedure is for state and local police to detain and debrief perpetrators in the clear on local media or internet and to discredit any attempted cover up by highly placed government officials involved in this illegal activity.  The FBI will engage in the same operation of detaining and debriefing by targeting a list of higher level personalities such as military leaders and former military leaders and politicians.  The military will confront and contain INSCOM and other hostile military formations and turn them over to the FBI for debriefing.  Phase two and three may overlap.  The ultimate aim is to compel INSCOM personnel to surrender and cooperate using all available means including inducements to compel public testimony.  If the INSCOM perpetrators stage major attacks against resistance leadership or civilian populations then military operations under stage four may be necessary but should only be used as a last resort.  After INSCOM is dealt with other similar containment and isolation operations will probably be necessary.  In order to increase pressure on the lead perpetrators monetary rewards for turning in the perpetrator leaders will be given to the soldiers under their command.  INSCOM is composed of elite military intelligence battalions made up of about 200 soldiers each under military discipline.  If these soldiers detain their commanders and agree to turn states evidence they will be given a reward of $2 million each and limited immunity.
Resistance scenario:  Phase One and Phase Two may be launched simultaneously;
Phase One: Information and Protest
People show their solidarity with a one day strike or slow down where people, if they must, go to work but accomplish very little by design.  Nation wide strikes are not customary in the US and may not be practical but may be more traditional in other nations.  People shall inform the general public using email trees, text messages, online forums, blogs, forums, youtube videos, radio call in, television, newspaper stories, and other means to educate the public that nonlethal microwave weapons similar to the ADS are being used by military intelligence battalions and others against innocent civilians.  Please make the case using the Four Facts.  The emails and texts may be automated.  The strategy is to flood the various media and saturate the public with the message of INSCOM criminal activity.  The national television media must be forced to cover the story by the pressure from the non-traditional media.  People shall begin simultaneous protests in public such as mock funerals for freedom, torch light marches, other public demonstrations, and “make noise protests” at dawn and midnight that can be anonymous.  Demand that political leaders begin the Five Reforms such as starting the truth and reconciliation commissions in the designated cities and holding Congressional hearings.  Demand opening of classified archives about electromagnetic weapons and make photos and all other relevant information public.  Televise the TRC and Congressional hearings on the public airwaves.   ALL Monarch films and books shall be considered educational materials and fair use granted with attribution.  Demand that INSCOM be brought under outside control by CENTCOM and that the current INSCOM and NSA directors be dismissed, detained, and debriefed as well as implement the Five Reforms.  What is called for is an honest public accounting even greater than that of the Watergate Hearings in the 1970’s.
Phase Two: Isolation and Containment
The 101st and 82nd airborne will surround Fort Belvoir and Fort Meade and keep everyone out and cut off from all utilities and supply, and protectively detain all personnel who emerge and turn them over to the FBI for debriefing.  Authorities will end payment of salaries and freeze bank accounts of all hold out personnel and family members.  The 101st will blockade Fort Belvoir and the 82nd will take Fort Meade.  The FBI and all friendly forces will be under the authority of CENTCOM for the duration.  Local police authorities will begin a bottom up strategy where they detain perpetrators in their jurisdiction and debrief them without interference for a minimum of three days.  Police in cities over 100,000 in population have priority over the county authority.  State police will detain and debrief perpetrators who are public officials such as mayors, police, or city and county officials.  The FBI will detain and debrief a list of witnesses and perpetrators and will only intervene with local police if they fail to debrief perpetrators or until after three days have passed.  The FBI will have authority to immediately detain all high level perpetrators such as high level military personnel and high level politicians.  All public debriefings are public evidence and shall be admissible in court due to the extreme circumstances of this case and danger of a coordinated cover up from high level personnel.  All perpetrators who cooperate shall receive physical protection as will their families.  The bottom up strategy is designed to make a cover up from above more difficult.   Standard procedure will be to debrief perpetrators in the clear on the internet or local and national media.
Phase Three:  Detain, Debrief and Flip
Give limited immunity and monetary rewards to some officers and enlisted men willing to give up hostile action and turn states evidence.  Place a reward on remaining high level perpetrators such as INSCOM and NSA Generals Lacquement, Alexander, and Hayden.   Keep those whom surrender and their families safe from retaliation and use their testimony as public proof to entice others to surrender.  Offer physical security and limited immunity and rewards to those who surrender and testify.   Expand to other suspect bases, MI battalions, and locations engaged in crimes against humanity.  There will be other cells of resistance that must be either bought off or confronted and defeated but the operation will proceed with a strategy of INSCOM first.  After the threat posed by INSCOM has passed a short window of limited immunity could be offered to perpetrators and hostile cells still in the field.  Remaining perpetrators and cells may be publicly identified and rewards offered for information about their location and activities that lead to their arrest and conviction.  Hostile forces may falsely accuse innocent parties to confuse and delay operations, so please use caution.  Suspect INSCOM forces are to be treated with dignity but closely questioned and held in a secure area for their own protection.  Social networking sites may be used to track and arrest the main perpetrators if they flee or to find microwave weapons using the red and green balloon exercise strategy.
Phase Four:  Military Force
If the perpetrators initiate hostilities and there is widespread loss of life and there is no other alternative to force then US military forces must take action.  A screen operation will go into effect first.  The public will be told that there has been a terrorist attack of some kind and others are feared to be about to occur.   Civil aviation will be ordered to land and hazardous cargo rerouted away from population.  All WMD will stand down.  Air force squadrons will launch in a defensive posture.  Possible targets of attack will take measures to safeguard their vulnerabilities such as powering down nuclear plants.  Large public gatherings will cease.  Government leadership will go to safe areas.  People will stay home where possible.  Defensive operations will focus on hostile command and control and weapons systems.  Defensive operations will be used only as a last resort when all other avenues have failed.  Missiles such as non-nuclear submarine launched missiles and other high speed conventional missiles or air to ground missiles will strike the hostile targets followed by slower missiles such as cruise missiles.  The Navy will use the Aegis missile system to strike potential air borne targets at altitude.  The cost of military confrontation in human life is considered potentially too high to contemplate and so this type of operation will only be used if hostile forces attack first and cause large scale loss of life and or a large loss of leadership personalities at the highest level.
Schedule of Action:  Pressure should be applied in an incremental fashion so as not to provoke immediate military retaliation by perpetrators armed with superior weapons, including perhaps WMD.  The main tactic is isolation and containment as opposed to direct confrontation.  Attempt to separate the troops from their leadership.  Bribe the perpetrators to cease hostile military operations.  Engage in nonviolent civil disobedience that targets the perpetrators without alienating the general public.  Ideally this operation would take a matter of days but this campaign will probably take months and should be paced and incremental so as not to exhaust those who resist.
Operations will begin simultaneously on all fronts beginning with phase one operations and moving to phase two operations in short order if possible.
CENTCOM is the operational head authority for all government entities.
Below CENTCOM are…US Army, Navy, Air Force, Marines, CID, CIA, and offices of DOJ, FBI.
FBI will directly control non-military police agencies…
local law enforcement, state police, ATF, DEA, Treasury, Secret Service, US Marshalls, others.
The local law enforcement authorities will have three days uninterrupted ability to debrief  lower level suspects and witnesses.  If they are not actively questioning the suspect continuously then the FBI may intercede.  The FBI will debrief high level perpetrators and witnesses, INSCOM members, directors, and former directors.
Fort Belvoir, Fort Meade, INSCOM:  A Blueprint for Containment
The first objective is to communicate to the main perpetrators of crimes against humanity that they are identified, surrounded, and cut off from political support.  The first major step is to isolate the main players, General Keith B. Alexander (NSA) and General David B. Lacquement (INSCOM), General Michael Hayden, by blockading them in their bases at Fort Belvoir, Fort Meade, National Ground Intelligence Center (NGIC), and National Reconnaissance Office (NRO).  All the base entrances should be blocked by cars and trucks and manmade barricades to stop all entrances and exits by military and intelligence personnel.  It is advised that military personnel be used to confront suspect military INSCOM personnel.  Cutting off all the utilities such as electricity and water should be accomplished to shorten the duration of the confrontation.  The main idea is to deny the site and its personnel to the criminal leaders.  When Alexander and Lacquement attempt to leave the bases they should be detained and debriefed and if deemed necessary by the FBI shall be placed in an artificial coma.  Next in importance is blockading the other INSCOM military intelligence battalions, assets and locations.  Other targets to surround and cut off include Army Mobility Equipment Command (Fort Lewis) and Offit AFB.  It is important to deactivate and neutralize all WMD.  The Five Reforms are the basis for ending the EMW war crimes and it is important to communicate to political leaders that people want them enacted quickly and universally, not just in the US.  Whether by emails, phone calls, petitions, or protest marches people should participate in making their voices heard.  The perpetrators will try to ride out the storm of protest, deny everything, make counter charges, and wait until people are tired of fighting or become too frightened to continue after attacks are made that are plausibly deniable.
Question:  Can the strategy of Gandhi defeat the power and methods of Hitler?  If so, how?  Gandhi was only able to defeat the British in India because if they imprisoned and tortured and killed him they would look like villains.  The British were unwilling to cross over the line and appear as a criminal regime while the current criminal leaders have no such qualms.  Answer:  Identify the perpetrators and engage them in nonviolent fashion.  Use a containment strategy versus military confrontation and winning hearts and minds of the populous.  Separate the criminal leadership from the men and women who make up their elite forces by offering the forces they lead a deal of limited immunity and monetary rewards.

The following is a blue print for containing and defeating powerful individuals involved in crimes against humanity.Resistance Scenario 5pgsIntro: The US and the world are under threat from elite Army intelligence battalions and others armed with a revolutionary breakthrough in electronic warfare.  These criminals are waging a dirty war of torture and assassination against innocent civilians.  It is impossible to predict the course of events and ultimate outcome of the resistance campaign against men armed with revolutionary anti-personnel weapons.  These death squads have the ability to assassinate anyone anywhere and possibly to stage mass attacks against large scale populations.  Direct military confrontation is not advisable.  Containment of INSCOM is the strategy we will use.  The strategy is to confront INSCOM first and isolate, contain, and cut them off from resupply.  The campaign will advance in three distinct stages or phases.  How fast these stages progress is difficult to say, but events will probably take months.  The perpetrators will use delay tactics and try to wait out the resistance.  The first stage is to inform the public and rally public protest and public outrage and to galvanize politicians to act by using public pressure.  The second stage to is to isolate and contain the main INSCOM perpetrators and their commands by both physical blockade, denial of material support, and political isolation.  If the main personalities attempt to run and hide in other military bases then a red balloon exercise using online social sites like twitter and facebook will be used to track and find them and recommence the isolation and containment.  It is possible that the first two phases may need to be implemented at the same time.  The critical factors are to capture the hearts and minds of the public, and communicate to the perpetrators that they are cut off and alone without material resources to continue their secret dirty war.  The third stage is to turn opposition figures into friendly assets by protecting them and their families and using monetary rewards to compel their cooperation.  A bottom up strategy uses local and state police to avoid a top down cover up.  The procedure is for state and local police to detain and debrief perpetrators in the clear on local media or internet and to discredit any attempted cover up by highly placed government officials involved in this illegal activity.  The FBI will engage in the same operation of detaining and debriefing by targeting a list of higher level personalities such as military leaders and former military leaders and politicians.  The military will confront and contain INSCOM and other hostile military formations and turn them over to the FBI for debriefing.  Phase two and three may overlap.  The ultimate aim is to compel INSCOM personnel to surrender and cooperate using all available means including inducements to compel public testimony.  If the INSCOM perpetrators stage major attacks against resistance leadership or civilian populations then military operations under stage four may be necessary but should only be used as a last resort.  After INSCOM is dealt with other similar containment and isolation operations will probably be necessary.  In order to increase pressure on the lead perpetrators monetary rewards for turning in the perpetrator leaders will be given to the soldiers under their command.  INSCOM is composed of elite military intelligence battalions made up of about 200 soldiers each under military discipline.  If these soldiers detain their commanders and agree to turn states evidence they will be given a reward of $2 million each and limited immunity.  
Resistance scenario:  Phase One and Phase Two may be launched simultaneously;Phase One: Information and ProtestPeople show their solidarity with a one day strike or slow down where people, if they must, go to work but accomplish very little by design.  Nation wide strikes are not customary in the US and may not be practical but may be more traditional in other nations.  People shall inform the general public using email trees, text messages, online forums, blogs, forums, youtube videos, radio call in, television, newspaper stories, and other means to educate the public that nonlethal microwave weapons similar to the ADS are being used by military intelligence battalions and others against innocent civilians.  Please make the case using the Four Facts.  The emails and texts may be automated.  The strategy is to flood the various media and saturate the public with the message of INSCOM criminal activity.  The national television media must be forced to cover the story by the pressure from the non-traditional media.  People shall begin simultaneous protests in public such as mock funerals for freedom, torch light marches, other public demonstrations, and “make noise protests” at dawn and midnight that can be anonymous.  Demand that political leaders begin the Five Reforms such as starting the truth and reconciliation commissions in the designated cities and holding Congressional hearings.  Demand opening of classified archives about electromagnetic weapons and make photos and all other relevant information public.  Televise the TRC and Congressional hearings on the public airwaves.   ALL Monarch films and books shall be considered educational materials and fair use granted with attribution.  Demand that INSCOM be brought under outside control by CENTCOM and that the current INSCOM and NSA directors be dismissed, detained, and debriefed as well as implement the Five Reforms.  What is called for is an honest public accounting even greater than that of the Watergate Hearings in the 1970’s.
Phase Two: Isolation and ContainmentThe 101st and 82nd airborne will surround Fort Belvoir and Fort Meade and keep everyone out and cut off from all utilities and supply, and protectively detain all personnel who emerge and turn them over to the FBI for debriefing.  Authorities will end payment of salaries and freeze bank accounts of all hold out personnel and family members.  The 101st will blockade Fort Belvoir and the 82nd will take Fort Meade.  The FBI and all friendly forces will be under the authority of CENTCOM for the duration.  Local police authorities will begin a bottom up strategy where they detain perpetrators in their jurisdiction and debrief them without interference for a minimum of three days.  Police in cities over 100,000 in population have priority over the county authority.  State police will detain and debrief perpetrators who are public officials such as mayors, police, or city and county officials.  The FBI will detain and debrief a list of witnesses and perpetrators and will only intervene with local police if they fail to debrief perpetrators or until after three days have passed.  The FBI will have authority to immediately detain all high level perpetrators such as high level military personnel and high level politicians.  All public debriefings are public evidence and shall be admissible in court due to the extreme circumstances of this case and danger of a coordinated cover up from high level personnel.  All perpetrators who cooperate shall receive physical protection as will their families.  The bottom up strategy is designed to make a cover up from above more difficult.   Standard procedure will be to debrief perpetrators in the clear on the internet or local and national media.
Phase Three:  Detain, Debrief and FlipGive limited immunity and monetary rewards to some officers and enlisted men willing to give up hostile action and turn states evidence.  Place a reward on remaining high level perpetrators such as INSCOM and NSA Generals Lacquement, Alexander, and Hayden.   Keep those whom surrender and their families safe from retaliation and use their testimony as public proof to entice others to surrender.  Offer physical security and limited immunity and rewards to those who surrender and testify.   Expand to other suspect bases, MI battalions, and locations engaged in crimes against humanity.  There will be other cells of resistance that must be either bought off or confronted and defeated but the operation will proceed with a strategy of INSCOM first.  After the threat posed by INSCOM has passed a short window of limited immunity could be offered to perpetrators and hostile cells still in the field.  Remaining perpetrators and cells may be publicly identified and rewards offered for information about their location and activities that lead to their arrest and conviction.  Hostile forces may falsely accuse innocent parties to confuse and delay operations, so please use caution.  Suspect INSCOM forces are to be treated with dignity but closely questioned and held in a secure area for their own protection.  Social networking sites may be used to track and arrest the main perpetrators if they flee or to find microwave weapons using the red and green balloon exercise strategy.      
Phase Four:  Military ForceIf the perpetrators initiate hostilities and there is widespread loss of life and there is no other alternative to force then US military forces must take action.  A screen operation will go into effect first.  The public will be told that there has been a terrorist attack of some kind and others are feared to be about to occur.   Civil aviation will be ordered to land and hazardous cargo rerouted away from population.  All WMD will stand down.  Air force squadrons will launch in a defensive posture.  Possible targets of attack will take measures to safeguard their vulnerabilities such as powering down nuclear plants.  Large public gatherings will cease.  Government leadership will go to safe areas.  People will stay home where possible.  Defensive operations will focus on hostile command and control and weapons systems.  Defensive operations will be used only as a last resort when all other avenues have failed.  Missiles such as non-nuclear submarine launched missiles and other high speed conventional missiles or air to ground missiles will strike the hostile targets followed by slower missiles such as cruise missiles.  The Navy will use the Aegis missile system to strike potential air borne targets at altitude.  The cost of military confrontation in human life is considered potentially too high to contemplate and so this type of operation will only be used if hostile forces attack first and cause large scale loss of life and or a large loss of leadership personalities at the highest level.   
Schedule of Action:  Pressure should be applied in an incremental fashion so as not to provoke immediate military retaliation by perpetrators armed with superior weapons, including perhaps WMD.  The main tactic is isolation and containment as opposed to direct confrontation.  Attempt to separate the troops from their leadership.  Bribe the perpetrators to cease hostile military operations.  Engage in nonviolent civil disobedience that targets the perpetrators without alienating the general public.  Ideally this operation would take a matter of days but this campaign will probably take months and should be paced and incremental so as not to exhaust those who resist.Operations will begin simultaneously on all fronts beginning with phase one operations and moving to phase two operations in short order if possible.CENTCOM is the operational head authority for all government entities.Below CENTCOM are…US Army, Navy, Air Force, Marines, CID, CIA, and offices of DOJ, FBI.FBI will directly control non-military police agencies…local law enforcement, state police, ATF, DEA, Treasury, Secret Service, US Marshalls, others.The local law enforcement authorities will have three days uninterrupted ability to debrief  lower level suspects and witnesses.  If they are not actively questioning the suspect continuously then the FBI may intercede.  The FBI will debrief high level perpetrators and witnesses, INSCOM members, directors, and former directors.  
Fort Belvoir, Fort Meade, INSCOM:  A Blueprint for Containment The first objective is to communicate to the main perpetrators of crimes against humanity that they are identified, surrounded, and cut off from political support.  The first major step is to isolate the main players, General Keith B. Alexander (NSA) and General David B. Lacquement (INSCOM), General Michael Hayden, by blockading them in their bases at Fort Belvoir, Fort Meade, National Ground Intelligence Center (NGIC), and National Reconnaissance Office (NRO).  All the base entrances should be blocked by cars and trucks and manmade barricades to stop all entrances and exits by military and intelligence personnel.  It is advised that military personnel be used to confront suspect military INSCOM personnel.  Cutting off all the utilities such as electricity and water should be accomplished to shorten the duration of the confrontation.  The main idea is to deny the site and its personnel to the criminal leaders.  When Alexander and Lacquement attempt to leave the bases they should be detained and debriefed and if deemed necessary by the FBI shall be placed in an artificial coma.  Next in importance is blockading the other INSCOM military intelligence battalions, assets and locations.  Other targets to surround and cut off include Army Mobility Equipment Command (Fort Lewis) and Offit AFB.  It is important to deactivate and neutralize all WMD.  The Five Reforms are the basis for ending the EMW war crimes and it is important to communicate to political leaders that people want them enacted quickly and universally, not just in the US.  Whether by emails, phone calls, petitions, or protest marches people should participate in making their voices heard.  The perpetrators will try to ride out the storm of protest, deny everything, make counter charges, and wait until people are tired of fighting or become too frightened to continue after attacks are made that are plausibly deniable.Question:  Can the strategy of Gandhi defeat the power and methods of Hitler?  If so, how?  Gandhi was only able to defeat the British in India because if they imprisoned and tortured and killed him they would look like villains.  The British were unwilling to cross over the line and appear as a criminal regime while the current criminal leaders have no such qualms.  Answer:  Identify the perpetrators and engage them in nonviolent fashion.  Use a containment strategy versus military confrontation and winning hearts and minds of the populous.  Separate the criminal leadership from the men and women who make up their elite forces by offering the forces they lead a deal of limited immunity and monetary rewards.  

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: