Monday, March 30, 2009

Mouth Breathing Moron

In February 2009, Congressman Barney Frank, D-Mass., called for a reduction in the defense budget:
"The math is compelling: if we do not make reductions approximating 25 percent of the military budget starting fairly soon, it will be impossible to continue to fund an adequate level of domestic activity even with a repeal of Bush's tax cuts for the very wealthy. I am working with a variety of thoughtful analysts to show how we can make very substantial cuts in the military budget without in any way diminishing the security we need...[American] well-being is far more endangered by a proposal for substantial reductions in Medicare, Social Security or other important domestic areas than it would be by canceling weapons systems that have no justification from any threat we are likely to face."
http://www.thenation.com/doc/20090302/frank



Photobucket

So if we cut 25% of $606.5B* we have $454.9B (rounding up) which is almost equal (439.2B) to the amount the US spent on Welfare and less than what just the Federal government spends on healthcare (672.3B). We just spent more money bailing out the banks than we spend on our National Defense.
Looking at it as a % of GDP we get around 4% which puts us around 27th among the worlds nations.

I think that mouth breather Barney Frank needs to STFU and if he wants to talk cutting spending perhaps he shouldn't be giving our money to his Campaign Donors**.

*606.5B is just what we spent on Military Defense and does not count the 35B in Foreign Military and Economic Aid or 83B in Veterans Benefits and Aid which is included in the pie chart as 'Defense' Spending

** A look at Barney's top contributors shows a huge majority of finance and insurance companies, and the individual donors list shows more of the same.

Saturday, March 28, 2009

A Republic, If we can take it back.



We need to reduce the power of the federal government
.
No more, no less. We need to tell our Representatives that we will not stand for the further expansion of the Federal government. Our states need to take back their power.

Thanks to WRSA for bringing the video to my attention.

Wednesday, March 25, 2009

Follows is a transcript of a conversation I had via PM on a forum.

Concerned: This has went out to all III here. I'm not posting it on ***********.

A WARNING TO ALL MILITIAS

http://www.youtube.com/watch?v=qO74Aq4iSWI&NR=

Me:
This is from a blog in Aug 2007
Quote:
I've put alot of thought into the possible need for the use of force towards the government after all legal and constitutional avenues of redress have failed. Not every person would stand up at once to throw down the government, at least not at first. At first it would be individuals and small groups sabotaging operations and assassinating government officials. Some would be caught and others would not, but the government would start to crack down on everyone. The more arrests in the middle of the night, kangaroo courts, and people shot "Escaping" and the more people will be willing to act. With the internet and modern communications there is nothing to stop people from sharing intelligence and coordinating actions.

The hardware and software sides of the issue are easy, Firearms are plentiful, explosives are easy to make, and unbreakable encryption is easy. The hard part is personnel , as the ATF and FBI have shown. Every potential recruit is also a potential informer, the Resistance would not be one large force, but hundreds and thousands of unconnected cells formed of close friends and family members hiding among the population. Perhaps larger units could be formed but only when every single person knows that everyone else is trustworthy.

Concerned:
Quote:
Every potential recruit is also a potential informer, the Resistance would not be one large force, but hundreds and thousands of unconnected cells formed of close friends and family members hiding among the population. Perhaps larger units could be formed but only when every single person knows that everyone else is trustworthy.
I am concerned about this.

Concerned: I know 12 here that I trust. They may know more. And you?

Me:

I know 12 here that I trust. They may know more. And you?

4 maybe 5, but I am a paranoid.
I also tend to put more trust in people who have seen the elephant.

Concerned wrote:
Quote:
Every potential recruit is also a potential informer, the Resistance would not be one large force, but hundreds and thousands of unconnected cells formed of close friends and family members hiding among the population. Perhaps larger units could be formed but only when every single person knows that everyone else is trustworthy.
I am concerned about this.


There is nothing wrong with sharing information with others, as long as it is not of a tactical nature. Be careful of what you say and who you say it to and you should be okay, keep everything compartmentalized with no one person knowing more than a couple other people, and those not the same people. Keep information away from people you don't trust, and if you do trust them look closely just in case.
Don't allow criminals access to any organization at all. People breaking the law draw attention and are usually more than willing to turn states evidence. Don't be stupid and break laws from inattention, how many criminals have been caught not for the big things they did but for speeding?

I think its a fine line we are all treading between Paranoia and Caution.
My response in regards to the "Tea Parties" going on and someone asking what they are worth..
So what is the modern equivalent of crates full of tea?
If it's a legal "get a permit from the city hall" protest, it really wont draw any attention unless you are the KKK or the like.
If it's an illegal"let's go vandalize the governments tea by throwing it into the bay" protest, then the media may cover it but only insofar as pointing out how 'criminal' your actions were.

There's the catch 22, if you follow the rules then no one will make a stink of it, if you don't follow the rules then you get marginalized as a criminal.

Society is starting be like a glass of water thats been microwaved, it seems on the outside to seem safe and ok, but the second something disturbs it, it will explode burning whomever disturbed it.

Friday, March 20, 2009

Communications Doctrine

Earlier I posted stuff about cyphers and I think they are great but only for non time sensitive communications, Now there are plenty of different ways to communicate available to the public, but most of those are easily intercepted and even jammed.

Radio's are usually inexpensive, but range is limited and they are easily listened into, and easily jammed. Encrypted radios are available but are expensive ($1500+ ea)

Cell Phones are handy, but can easily be jammed, and tracked, as well as a log of who calls who and when.

When a small unit is engaging a force that is superior in size and funding, communications are very important. You need to prevent the enemy from communicating with each other while allowing your unit to be able to communicate.
One Idea may be to use disposable phones to communicate, perhaps with call conferencing, while ensuring that enemy communications are disrupted at the beginning of any operation.
How to disrupt communications? I have several Ideas on this but I think I will keep them to myself, suffice to say if you research the type of communications the OPFOR uses and find any weaknesses, such as single data frequency, or even a central retransmission frequency and Jam or negate that weakness then communications will be hindered.

Thursday, March 19, 2009

Cyphers II

So this morning someone posts up some suppositions and this chart..

let's see what we can eliminate...

1. chances are it's not a simple ceasar shift. the freqs don't work out.
2. chances are the PT alphabet is spread across the whole range of 00-99, and not rotated (i.e. 00-25, then 26-51, etc). still could be simple substitution cipher.
3. it's not viginere, as it requires a key and he said there was none.
4. it's not playfair or any other polygraphic, as he said 2 digits = 1 PT character




This made me realize how close he was to getting it right, if he realized he was shifted one letter high he would have it. so I was thinking, what if instead of going 0-9 both horizontally and vertically we used 0-9 horizontally and 9-0 vertically.
I.E.

x 0 1 2 3 4 5 6 7 8 9
9
8
7
6
5
4
3
2
1

This would mix up the order enough to throw off anything so simple as someone just writing 0=a 1=b 2=c ect.

In regards to it not being playfair, its funny because I originally based it off of a cypher in a book I read (I'll find it later and give up the title), that claimed it was a playfair cypher.

Wednesday, March 18, 2009

Cyphers are Fun!

I recently posed a riddle to some forum people on one of the forums I frequent.
I made it easy and didn't use any Encryption Keys or initialization vectors.
The basic idea is as follows

Draw a square 11 boxes to a side, now block out the top left square, it won't be used.
Next fill in the top row and left column with the numbers 1-0


1

2

3

4

5

6

7

8

9

0

1











2











3











4











5











6











7











8











9











0











Next you would fill in the blocks using your encryption key, the key can be as long as you want it, the only real rules are to not repeat any letter more than 4 times and I and J are for our purposes the same letter, I didn't use an Encryption key to make it easier to decode, but I'll use "Verum Est a Tellum" here in this example.


1

2

3

4

5

6

7

8

9

0

1

V

E

R

U

M

E

S

T

A

T

2

E

L

L

U

M






3











4











5











6











7











8











9











0












So now that we have our Key in place we fill in the rest of the blanks using the alphabet remembering to make sure that each letter only shows up 4 times in the table.


1

2

3

4

5

6

7

8

9

0

1

V

E

R

U

M

E

S

T

A

T

2

E

L

L

U

M

B

C

D

F

G

3

H

I/J

K

N

O

P

Q

W

X

Y

4

Z

A

B

C

D

F

G

H

I/J

K

5

N

O

P

Q

R

S

V

W

X

Y

6

Z

A

B

C

D

F

G

H

I/J

K

7

L

M

N

O

P

Q

R

S

T

U

8

V

W

X

Y

Z

A

B

C

D

E

9

F

G

H

I/J

K

L

M

N

O

P

0

Q

R

S

T

U

V

W

X

Y

Z


I know it looks a bit confusing but all I do is count how many of each letter I have and then skip that letter for that many repetions of the alphabet.

V=1 E=3 R=1U=2 M=2 S=1 T=2 L=2

So the first repetion I skip all the letters of the key, the second only the letters with 2 or more, the third only those with 3 or more, and forth would be any letters that are repeated 4 times.


Next we take our plain text and convert it to the cipher.

For this example we will use "Cyphers are fun" as our plain text.

First letter is "C" so we find the letter "c" in the table and look to see which numeric characters coincide with "c"


1

2

3

4

5

6

7

8

9

0

1

V

E

R

U

M

E

S

T

A

T

2

E

L

L

U

M

B

C

D

F

G

3

H

I/J

K

N

O

P

Q

W

X

Y

4

Z

A

B

C

D

F

G

H

I/J

K

5

N

O

P

Q

R

S

V

W

X

Y

6

Z

A

B

C

D

F

G

H

I/J

K

7

L

M

N

O

P

Q

R

S

T

U

8

V

W

X

Y

Z

A

B

C

D

E

9

F

G

H

I/J

K

L

M

N

O

P

0

Q

R

S

T

U

V

W

X

Y

Z

In this example the numbers 2 and 7 coincide with the first "c" and we always use the number from the left column before we use the number for the top row, so our first number pair is 27. Other letter "c" number pairs are 44, 64, and 88.

Our next letter is y; its number pairs are 30, 50, 84, and 09. We continue assigning one number pair to each plaintext character until the entire message is encrypted.

27 30 36 48 80 02 03 = Cyphers

19 55 80 = Are

91 05 34 =Fun.

Next to defeat people figuring word groups from length of words we remove the spaces and break the number pairs into even sized groups.

27303648 80020319 55809105 34

The advantage to using this key is that even if they decide to do a frequency check it will not give a correct frequency because each letter can be one of 4 different code groups, thats 100 different number pairs for 25 letters.