Electronic Warfare for the Fourth Generation Practitioner.
Future insurgencies will likely employ locally developed Electronic Warfare (EW) technologies to exploit COIN RISTA vulnerabilities in consumer, military and security forces communications systems in order to deliver military effects and compete as a peer/near-peer competitor.
The FBI Communications Breach of 2010
This paper explores the “FBI communications breach,” first reported in 2019, as an application of publicly known and researched vulnerabilities of P25 communications systems and considers them in an operational and intelligence context with possible tactics employed and as exploration of open source technologies and literature.
Troubleshooting Electronic Devices in Field Environments
This article provides established and proven guidance in troubleshooting electronic devices and restoring them to service. This tutorial is intended to be applied in an algorithm like fashion until the device renews operation, the device is referred to advanced technical support or restorative efforts are abandoned.
Camping Solid Fuels
Several common solid camping fuels were tried in various environments and evaluated from both this and a preparedness perspective based on heat output, availability and storability. Of the choices below, the fuel that produces the most heat from a smaller portion and widely available to civilians is selected over one that does not have these characteristics.