0 0
Wagner Group PMC - About Disguise - The Cyber Shafarat - Membership only site
Read Time:1 Minute, 32 Second

About disguise.


“To defeat a crest, you need to think, see like a crest, behave like a crest.

It’s funny and painful to watch our technique and the logic of its disguise, when a maskset is wound on civilian Sables / Gazelles moving IN A SETTLEMENT … immediately a “civilian car” becomes a “Muscovite” and the enemy has no doubts about the attack. In the village, the safest and most inconspicuous car is a red van with the inscription “furniture” … just like driving in the dark without lights, far-horned people see a car that just drives … or tries to disguise itself . Look at yourself from their point of view. Civilian vehicles merge into the general traffic, where it is difficult to identify where the locals are, where the enemy is. But, we are in the army, where all cars should look like a military one … Where civilian cars cannot be … even bought … and even for money …
In the FIELD and similar conditions, caponiers immediately become an object of attack, and camouflage nets greatly increase the chances of staying on wheels. In such conditions, it doesn’t matter whether a civilian car or a military one. The chances of becoming a target are equal. If an obviously civilian car is “hidden” in a caponier or under a net, doubts about its ownership melt away. I’m not talking about tactical signs and military unit emblems .. To disguise, you don’t always need to be invisible. You need to look natural for the area. Take care of yourself and technology.


push:

At night, “Baba Yaga” flew in. Thank God there were no victims. If someone did not understand the message, then in the near rear, where there are civilians, it is not always good to disguise equipment, crests can take it for locals, but as soon as camouflage appears, it immediately flies.

About Post Author

Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

Trending

Copyright 2024

Discover more from The Cyber Shafarat - Membership only site

Subscribe now to keep reading and get access to the full archive.

Continue reading