The Other McCain

"One should either write ruthlessly what one believes to be the truth, or else shut up." — Arthur Koestler

‘Persona Management’ for Wackjobs: Rauhauser’s Methods of Deception

Posted on | June 20, 2012 | 58 Comments

“I’ve been all over Patterico for the last several weeks, as he looks to be a pretty good candidate for the planner/operator behind Weinergate, but the other players have been getting attention, too.”
Neal Rauhauser (aka, “Stranded Wind”), July 27, 2011

FROM AN UNDISCLOSED LOCATION
Brett Kimberlin became a “client” of Neal Rauhauser in 2011. Rauhauser has described his specialty as “solving problems in the social media work space for political campaigns and causes,” and Kimberlin had distinct “problems in the social media work space,” namely how to stop bloggers from writing about Kimberlin’s criminal past.

Kimberlin had sued Seth Allen, threatened to sue Patrick “Patterico” Frey and, I am told, engaged in various forms of harassment against Mandy “Liberty Chick” Nagy, whose October 2010 article about Kimberlin was unimpeachably factual.

Clearly unable to “win” his fight against truth by suing for libel, and evidently fearful that widespread exposure of his vicious criminal history would hinder fundraising for his two non-profits (Justice Through Music Project and Velvet Revolution), Kimberlin seems to have seen a need for someone with Neal Rauhauser’s skills.

Exactly when Kimberlin put Rauhauser on his payroll, we don’t know. Amid his obsessive Daily Kos blogging about the WeinerGate scandal — which Rauhauser portrayed as a hoax perpetrated by Andrew Breitbart and other shadowy right-wing conspirators — Rauhauser declared (under his alias “Stranded Wind”) on July 4, 2011, “someone forwarded me the complaint [made by Kimberlin] regarding Frey running a cyberstalking campaign in conjunction with South Easton, Massachusetts resident Seth L. Allen.”

Rauhauser announced plans to move to Washington, D.C., area on July 7, 2011. Rauhauser represented himself as an agent of Kimberlin’s Velvet Revolution in a September 2011 e-mail to organizers of “Occupy Boston.” And as previously explained: “In a comment posted at a progressive blog in October 2011, Rauhauser described being contacted by a ‘very big dog from the Anonymous pen’ who agreed to assist Velvet Revolution in an apparent plan to attack enemies of Rauhauser and Kimberlin.” Rauhauser accompanied Kimberlin to the May 29 hearing in Maryland at which Aaron Walker was arrested.

What has Rauhauser been doing online for the past year? What services does he perform for Kimberlin or whatever other clients are paying him? The archive of material Rauhauser attempted to “scrub” from the Internet offers important clues, including one Scribd.com document from earlier this year entitled, “Persona Management Methods: Secure & Portable Persona Management Version 3.0.” The full document is nearly 2,000 words; the following excerpts are about 1,000 words. I urge readers to examine this very carefully:

The internet is becoming increasingly dangerous for everyone, and in particular there are targeted attacks aimed at activists and organizers. If you are running a specific persona for any reason, say interacting with a specific social media community, it’s probably best that you compartmentalize it from your other activities by encapsulating it in a purpose built virtual machine. . . .
We keep a copy of TAILS, a hardened, read-only version of Linux in which all applications are configured to use TOR, for truly radioactive environments. Coupling a TOR only virtualized OS with a host OS running a VPN is proof against a variety of ills in the world today, and the subject of another write up of ours entitled Double Secret Internet.
The whole idea is to encapsulate an online persona in a safe environment. The VM is the container for the personality, but what if your laptop is stolen, or if you’re arrested and questioned? We run http://truecrypt.comsoftware to make encrypted file containers. Our first test involved creating a 4 gig space, binding it to drive W:, and installing Windows in a VM there. The persona in the VM is now perfectly safe if the machine is lost or stolen, so long as a strong password is used. . . .
The most basic means of IP address concealment is to install The Onion Router (TOR) and the bundle of tools that come with it. . . .
We tested Hotspot Shield in our initial build and it seems to work fine, but it requires that you recall you need to start it, and only protects browser traffic. . . . If everyone who uses this settles on the same service that means banning a handful of IP addresses functionally shuts everyone out. We probably need to figure out how to provide our own endpoints using a rotating set of VPS in other countries, but that’s a job for the infrastructure people. . . .
This cannot be stressed strongly enough: we have only protected against the following threats. Disclosure due to loss/theft/seizure of host computer
Disclosure due to spearfish or other compromise of browser
Disclosure of IP address due to log examination or subterfuge
Monitoring of traffic by your ISP or a compromised machine on your network
You might face a loss or theft, you could run into a technically advanced opponent, but it is almost certain that if you try to approach a venue where you are already known by an existing name or pseudonym that you will get “made” in short order.
You have habits that include:
The time(s) of day you are active
The language you speak
The situational knowledge you have when interacting with a certain group
The software you prefer to use
Quirks of spelling, punctuation, and other subtle hints as to identity
Whatever objective you have in approaching the venue
The following are some failure modes we’ve personally experienced over the years:
Used a pet phrase from a persona in a venue we frequented — instant outing
Used bit.ly link shortened from a known account via Twitter — instant outing
Disclosed specific software preferred during conversation, not a full outing but it brought scrutiny that made the effort fail eventually
Use of phone number that had a single obscure Google hit — instant outing.
We often feel we’re being clever in constructing a persona but we generally fail miserably due to time constraints. We’re always goal oriented when in character and that is an instant tell to those with situational awareness. If you don’t have time to “be” someone else and remain in character your results will be limited. . . .
Web Brain – powerful mind map facilities, no sense of timeline, team functions permit easy sharing. Contents are discoverable if you use the web sync, stick to BrainZips in encrypted containers for safety. . . .
Maltego –Open source intelligence collection platform, heavy on data visualization, mostly for Twitter-centric things. . . .
Sentinel Visualizer — industrial strength social network analysis/data visualization with temporal and geospatial analysis. . . .
The whole concept of persona management was getting a lot of attention during 2009 when I was still active with Project Vigilant. There were a bunch of half baked solutions going around, really expensive things that I felt would only serve to train smart opponents as they watched their less swift peers fall for the subterfuge. Fast forward to 2012 and now the internet is so toxic I’ve corralled my actual social media presence in a couple of VMs to stick a wrench in the constant profiling and intrusion attempts, and those VMs live on a machine that doesn’t touch anything important.
There is a lot of drag as I move stuff back and forth, certainly, but I’m not keen on uninvited visitors. More and more Twitter and Facebook serve only as channels for introduction and venues for public theater. Anything of consequence has vanished into OTR encrypted chat, or SILC servers, and new contacts have to run the gauntlet of my quizzing those who introduce them, then getting them on the phone so there is a voice and a callable number to go with. A sloppy social network only betrays maybe 25% of what is important to an intruder lacking subpoena power. . . .
Commit to trying to run a persona for a while if for no other reason than to understand what will and won’t work; your situational awareness will be dramatically enhanced. Stick to it until it becomes second nature and you can simply disappear when needed, or protect your friends from unwanted attention with a fog of disinformation. You have the natural rights of free speech, free association, and free assembly. There are many private entities, from the lone obsessive stalker to the largest corporate entity that will interfere in all three of these fundamental human rights. You commit a courageous, moral act when you do these things we suggest, leaving those who do not respect you pounding their keyboards and crying with frustration.

Clearly this suggests that Rauhauser is employing at least one deceptive false “persona” for secretive purposes which anyone with common sense would suspect might be criminal in nature. The mystery of what exactly Rauhauser has been doing online that would require such elaborate protections for his “persona” should not, however, lead to unsubstantiated speculation. But you rather doubt Neal was merely haunting Web forums as a blog troll, eh?

In last night’s post (“Neal Rauhauser: Internet Super-Spy!“), I focused on Rauhauser’s fascination with Maltego software, which creates maps of online connections. One of the commenters (who is on Twitter as Erik Robert Nelson) offered this insight:

Software like Maltego can be helpful when used by people with half a brain. But for those who already have a tendency toward thoughts of paranoid conspiracy, it can reinforce mental disorders. The internet is full of connections from one person to the next–but most of those connections are ephemeral. A truly paranoid person can inflate those simple connections far beyond their true value. Maltego only shows connections, it doesn’t impose any meaning on them. Giving a paranoid person Maltego is like giving a manic person amphetamines.

This demonstrates a problem not just with Rauhauser, but with the Internet in general: It tends to bring out the worst in bad people. Narcissists, bullies, liars, manipulators, perverts, thieves — all manner of anti-social personalities manifest their worst qualities online. We have seen more than one example of what happens when we try to ignore or dismiss as trivial “blog wars” the Internet manifestations of severe sociopathic tendencies. But why bring Charles Johnson into this, huh?

“Wherever you go, there you are” — this is one of the great truths of life. I’ve known people who got married, wrecked their own marriages, blamed the break-up on their ex-spouse, then re-married and wrecked that second marriage by the same methods they’d wrecked the first. You see a similar tendency in people who skip from job to job, from business failure to business failure, always offering some excuse that involves blaming other people for their problems.

Such people fail to recognize that they are the source of their own problems. They refuse to learn from their mistakes and persist in their habitual ways while attempting to find some new environment where, they vainly imagine, the habits and tendencies that have produced failure so often before will suddenly produce success.

Alas, they can’t run away from the source of their problems because wherever you go, there you are.

Benjamin Franklin once observed, “Experience keeps a hard school, but a fool will learn in no other.” Having learned a few hard lessons from experience myself, I’m always amazed — and immensely frustrated — when I encounter people like Neal Rauhauser, who stubbornly refuse to accept responsibility for their own failures.

Neal Rauhauser is a sadly familiar type in political New Media nowadays: The dilletante fame-junkie with little or no previous experience in politics or journalism who saw, in the rise of the political blogosphere, a chance finally to Be Somebody.

How’s that workin’ out for ya, Neal?

Resisting the temptation to write a 5,000-word essay on the widespread phenomenon of which Neal Rauhauser is but one sad and extreme example, I’ll instead invite the reader to peruse Rauhauser’s “Stranded Wind” archives at Daily Kos.

What the astute reader will discern is Rauhauser’s repeated efforts to impress others with his assertions of expertise. It appears that his 2010 TwitterGate debacle was a misguided attempt by Rauhauser to make himself a hero to the Progressive online community by waging a Twitter war against the Tea Party. Sir Neal planned to ride out and slay the Tea Party dragon, but instead got his virtual ass handed to him by Patrick Read, Greg Howard, Zapem and others.

Unable to accept responsibility for his failures, Rauhauser scapegoated his enemies and has spent the past 18 months trying to redeem himself by slaying some other dragon: Patrick Frey, James O’Keefe, Aaron Walker, Ace of Spades — any target will do, just as long as Rauhauser can claim “victory” and strut before his admirers as a dragon-slaying White Knight.

Once again, however, Rauhauser has committed a tactical blunder that anyone with infantry training will recognize: He’s marched into an L-shaped ambush, hit the trip-wire that exploded the Claymore mines, and now finds himself pinned down in the kill-zone by heavy fire from forces he did not expect to encounter.

Neal’s paranoia is, in some sense, justified: For the past year or so, those whom he has targeted have been watching his online activity very closely. All the things he tried to “scrub” from the Internet? Screen-capped, cached and securely stored offline.

One of the intended victims of Rauhauser’s smears told me the other day: “I had to get a new computer just to hold all the stuff I’ve got on Neal. External hard drives, CD-ROMs — I’ve got sh*tloads of it, so much I can’t even keep track of it all.”

That stuff will keep coming out, day after day, and there is nothing Rauhauser can do to stop it. His imagined “persona management” expertise deceived no one, except perhaps himself, as he succumbed to the delusion that he could wage his vicious personal war against bloggers without his deceptive manipulations being exposed.

To repeat the question: How’s that workin’ out for ya, Neal?

Robert Stacy McCain, Whereabouts Unknown

 

 

 

UPDATE: Linked by That Mr. G Guy, The Camp of the Saints, Daley Gator and Pattericothanks! — and welcome, Instapundit readers! Now a Memeorandum thread.

 

THE KIMBERLIN FILES:

 


Comments

58 Responses to “‘Persona Management’ for Wackjobs: Rauhauser’s Methods of Deception”

  1. Red
    June 20th, 2012 @ 2:18 pm

    Pardon my obvious question but has the FBI been notified of this man and his online habits? Surely Quantico has some folks who can net circles around this guy. I would think that higher law enforcement would be very interested in all of this.

  2. DaveO
    June 20th, 2012 @ 2:26 pm

    I’m something of a geek, and all I can think of: path maps from one’s own computer to wherever the VM is hosted. Hansel and Gretel should have such large breadcrumbs…

    Wow.

    Wonder how many of Rauhauser’s acolytes are aware that they’re no longer quite so anonymous.

  3. Some1
    June 20th, 2012 @ 2:42 pm

    Shh!  Don’t tell ’em! 😀

  4. Russ Emerson
    June 20th, 2012 @ 3:35 pm

    There’s very little that Law Enforcement can’t figure out when properly warranted.  Anonymity  can be defeated.

  5. Finrod Felagund
    June 20th, 2012 @ 3:57 pm

    “No matter where you go, there you are.”

    “Laugh-a while you can, monkey boy!”

     “History is-a made at night. Character is what you are in the dark.”

    “Lithium is no longer available on credit.”

    Neal Rauhauser and Brett Kimberlin are certainly no Buckaroo Banzai, that’s for sure.

  6. Adjoran
    June 20th, 2012 @ 4:00 pm

     Yes, after the Patriot Act and other counter-terrorism initiatives, the new technology isn’t so easy to hide within.  People who think that free programs on the internet can protect them from federal agents – or even determined private parties with professional software – are deluding themselves.

    But self-delusion is the one thing the Kimberlin-Rauhauser-Friedman-Zeese Gang seems to do very well indeed.

  7. DaveO
    June 20th, 2012 @ 4:00 pm

    Anonymity is going the way of the dodo. And like that fearless bird,  hackers are going wherever they want, unaware that Google tracks them back to the nest.

  8. Red
    June 20th, 2012 @ 4:25 pm

    Not sure if it’s my browser or what but here’s my comment again.

    Pardon my obvious question but has the FBI been notified of this man and his online habits? Surely Quantico has some folks who can net circles around this guy. I would think that higher law enforcement would be very interested in all of this.
    You’re doing a fantastic job of shining that spotlight. Your family is in my prayers. 😉

    It seems I can’t post the link I wanted to on here. It was a link to the FBI’s website where you can report internet crime. You’re probably way ahead of me on this.

  9. crosspatch
    June 20th, 2012 @ 5:07 pm

    ” Maltego is like giving a manic person amphetamines.”

    There is another even more fundamental weakness to such tools in that once people are aware that such tools are in use, countermeasures are very easy to deploy.  Some of these are easier to spot than others.   I won’t go into them here but it doesn’t take a lot of thought to arrive at a few.  Some of them do take the cooperation of people, others don’t.

    But the point is that once it is known that such tools have been brought to bear, countermeasures can be pretty effective in neutralizing them.

  10. Evi L. Bloggerlady
    June 20th, 2012 @ 5:24 pm
  11. Evi L. Bloggerlady
    June 20th, 2012 @ 5:25 pm

    Acutally the treatment for many forms of manic behavior is giving them amphetamines.  It is counter intuitive, but depressants often make it worse.  

    Sorry to geek out there.  

  12. Adjoran
    June 20th, 2012 @ 5:42 pm

    Neal Rauhauser’s problems won’t be solved by drugs – although a long course of electroshock therapy couldn’t hurt.

    I bet they smoke his fingernail clippings.

  13. placitas
    June 20th, 2012 @ 6:41 pm

    Please, that’s not at all true.  There is no clinical study that I’m aware of that would endorse something as irresponsible as giving stimulants to a client with active mania.  I’m saying this as a professional in psych who is and has worked a long time in many clinical venues.   What you said is totally wrong.

     Enough said.

  14. Russ Emerson
    June 20th, 2012 @ 6:55 pm

     They don’t even make it to “Rug Sucker” level.

  15. The #BrettKimberlin Report D+26: Neal Rauhauser – Virtual Private Dick / Agent 00Douche « The Camp Of The Saints
    June 20th, 2012 @ 7:15 pm

    […] his most recent, ‘Persona Management’ for Wackjobs: Rauhauser’s Methods of Deception: Brett Kimberlin became a “client” of Neal Rauhauser in 2011. Rauhauser has described his […]

  16. SDN
    June 20th, 2012 @ 7:33 pm

     How do you think Ritalin works on kids, who also have that same counterintuitive response when ADD?

  17. Evidently, Today Is Everyone Blog About #NealRauhauser Day « That Mr. G Guy's Blog
    June 20th, 2012 @ 7:46 pm

    […] Blog About Neal Rauhauser Day and Stacy starts us off with three great postings here, here and here. Basically what these three reports are, are a treatise on the inner workings of a paranoid […]

  18. McGehee
    June 20th, 2012 @ 8:40 pm

    Might as well give it a try. What does he have to lose?

  19. MSNBCRAZY « The Daley Gator
    June 20th, 2012 @ 8:49 pm

    […] McCain, who has been busy blogging about some wackjobs here lately might seem to be arguing that I am wrong be calling MSNBC MSNBS. Perhaps I need to leave the C in […]

  20. After Dinner Links | Liberty News Network
    June 20th, 2012 @ 9:01 pm

    […] The Other McCain: Persona Management’ for Wackjobs: Rauhauser’s Methods of Deception […]

  21. Yes, I am still blogging about Brett Kimberlin, and his super spy sidekick, Neal Rauhauser! « The Daley Gator
    June 20th, 2012 @ 9:07 pm

    […] tactical blunders, not to mention Rauhauser’s denial of his own culpability in his screw-ups. Go read it all here is a small taste What the astute reader will discern is Rauhauser’s repeated efforts to […]

  22. Instapundit » Blog Archive » THE THING ABOUT STACY MCCAIN IS, he’s relentless….
    June 20th, 2012 @ 9:59 pm

    […] THE THING ABOUT STACY MCCAIN IS, he’s relentless. […]

  23. Wombat_socho
    June 20th, 2012 @ 10:01 pm

     One wonders if a lot of that free software doesn’t in fact have trapdoors built in by the NSA or some other government agency with an interest in whacking cyberanarchist wannabees.

  24. Wombat_socho
    June 20th, 2012 @ 10:02 pm

     Not just kids, either. Placebo effect, maybe?

  25. danheskett
    June 20th, 2012 @ 10:17 pm

    Most of the tools he mentions in his technical notes are in fact open source, which means that someone who interested can verify that do not contain backdoors.

    The temptation to assert that a determined government or person can break some of these methods is there, but mostly not factual.

     Encrypted virtual filesystems, for example, in most implementations, are truly unbreakable within normal time constraints.

  26. JeffS
    June 20th, 2012 @ 10:39 pm

    An excellent article, Stacy.  Your analysis of NR is sound, especially when it comes to Maltego.

    While not personally familiar with Maltego, I do use professional analysis & design software, and one major pitfall is making sure you understand what the software can and can NOT do.  All software has some limitation, which one must understand, or the analysis is off.  I see this problem even with my peers — they just plug&chug, and wonder why their answers are off from reality,

    The same is true for data.  The most orderly, organized data in the world will lead you to false conclusions if you don’t have a firm grasp on where said data set came from.  Worse, if you have a false or incorrect understanding, your conclusions are more likely to lead far, far astray. 

    If NR is a mentally ill as the evidence suggests, he is building his own data sets framed within his own delusions.  That’s a scary thought, given who he works with.  Or claims to work with.

    /persnickety mode ON

    …L-shaped ambush…“: that’s called a “enfilade”.

    /persnickety mode OFF

  27. DirtyDave
    June 20th, 2012 @ 11:26 pm

    This is Pulitzer-worthy reporting, not that Mr. McCain will get one.  Sad that,  

  28. halcrawford
    June 20th, 2012 @ 11:27 pm

     They’re probably still struggling with how to pronounce “John Bigboote.”

  29. David R. Graham
    June 20th, 2012 @ 11:59 pm

    There is a principle of medicine that recommends, as I hazily recall the wording, “giving like to like.”  So, for fever, give a fever-inducer, etc.  I think this traces to Hippocrates and/or Pythagoras, but my memory is dim on that.  Homeopathy (modernly Hahnemann +) rests on that principle.

  30. Mike Rogers
    June 21st, 2012 @ 12:18 am

    Very cool article. BowWauser is clearly so paranoid that people might even be out to get him.
    I remember a famous university whose computer science department ran not one, but THREE TOR exit nodes – just in the interests of science, don’t ya know!
    As BowWauser describes,TOR is a method by which your browsing and other Internet activities appear to come from somewhere else, and was originally invented to permit dissidents in non-free countries to access information which would otherwise get them shot.
    What must be immediately apparent, is that the cleverest maze for obscuring the origin of a user can only function if the maze has an exit, preferably a lot of exits. Once the TOR-obscured user locks onto a website, he must continue to use the same exit node for at least a short while so that the responses can come back to him. This does not tend to inconvenience the user, but it can bring unwelcome attention on the exit node operator – after all, once dissidents are accounted for, who else do you think might want to obscure their web activities? Yes, criminals, pornographers, and assorted scam artists!
    At said famous university, it was roughly a weekly occurrence to get a heavy-handed cease, desist, and hand over your records request from the Feds, something which was highly inconvenient for university IT staff, and mildly amusing for the students and professors at the compsci department. Just for grins, the best and brightest amongst us had chosen to place the TOR exit nodes in the university’s public IP space, rather than rent a new range from a local ISP.
    So, yes, I know TOR, and it confirms that BowWauser is a devious paranoid hound!

  31. G Joubert
    June 21st, 2012 @ 12:22 am

    ADD in children is a totally different disorder than Bi-Polar Disorder in adults.  Comparisons are inapt.

  32. G Joubert
    June 21st, 2012 @ 12:24 am

    I’m trying to decide which is the bigger perp, Kimberlin or Rauhauser.  It’s neck and neck.

  33. al
    June 21st, 2012 @ 2:25 am

    Bipolar is NOT ADHD.

    If you give someone with bipolar(aka manic depressive) stimulants it can trigger mania. It will NOT make it better. Adders are understimulated. So if give an someone with ADHD a stimulant like amphetamine it will calm them down and help them focus.

    For someone with bipolar here are some medications that are used (from the mayoclinic.com)
    http://tinyurl.com/3jsr7bo

  34. Sl0re10
    June 21st, 2012 @ 3:40 am

    The vm stuff is not an end all be all. That ‘infrastructure’
    stuff matters a lot too (what you post on the internet will still be tied back
    to your IPs). It’s so transparent that it is to avoid subpoenas I wonder how it
    will go over the first time a judge hears your excuse for not turning ANYTHING
    over. ‘You what to ALL your computer/s in use the time/s in question????’.  I can see getting away with saying you’ve reformatted
    a couple devices (my pad was glitched so I had to reset it back in May)…  but you torched EVERYTHING?

  35. Wombat_socho
    June 21st, 2012 @ 3:44 am

     We sorted ambushes into L, X, and V-types back when I spent time in the infantry. I think this “enfilade” word went out when the M-16 came in.

  36. Wombat_socho
    June 21st, 2012 @ 3:45 am

     I could be wrong, but I think the lawyers refer to “torching everything” as “destroying evidence”. Very bad plan.

  37. Erik Robert Nelson
    June 21st, 2012 @ 6:15 am

    The easiest countermeasure is to just be yourself on the Internet. Not share all your personal information, of course (that would be foolish). But creating fake personas, etc … it’s juvenile. It’s an artifact of the Internet’s illusion of anonymity. Once you realize that there’s no true anonymity, it’s easy to simply be resolved to reality and not even try. And better for everyone, I think, because as liberating as anonymity might seem, it’s the source of most of the Internet’s more annoying features (such as sockpuppets and trolls).

    Transparency is the ultimate countermeasure. yet I have a feeling that those prone to paranoia would be unaffected by transparency. Even if all the connections are open and public, they’ll still posit connections that aren’t–even without evidence. I have no idea (and little interest in) what’s going through Rauhauser’s head. But it’s not difficult to surmise what’s going on here.

  38. Bob Belvedere
    June 21st, 2012 @ 8:03 am

    Neal Rauhauser is Booji Boy!

    http://en.wikipedia.org/wiki/Booji_Boy

  39. Bob Belvedere
    June 21st, 2012 @ 8:06 am

    True…he’s already a loser.

  40. Bob Belvedere
    June 21st, 2012 @ 8:07 am

    It’s a great word and shouldn’t have.

  41. Bob Belvedere
    June 21st, 2012 @ 8:08 am

    Why?  That award means nothing these days.

    It would be nice, however, if some of the great thinkers of our time acknowledged Stacy, such as Thomas Sowell.

  42. Shortfatbaldguywithglasses
    June 21st, 2012 @ 8:47 am

    This guy is just an asskicking waiting to happen.

  43. JeffS
    June 21st, 2012 @ 11:25 am

     Probably.  My training emphasized enfilade as the phrase du jour for ambushes and the defense, and that was well after the M16 was the primary long barreled bullet launcher.  Never heard of the L, V, and X types, although those are certainly much more accurate descriptions.

  44. JeffS
    June 21st, 2012 @ 11:27 am

     Sorry, the coffee, it’s still kicking in.  Not “Probably”, but “Perhaps not”.  Then again, a lot of my ROTC instructors were old school Vietnam veterans.

  45. More On Crazy Neal Rauhauser
    June 21st, 2012 @ 11:35 am

    […] Stacy cannily points out, Rauhauser earned his living by bedazzling leftists with his BS about arcane data mining tools and fi…. The idea was to hide all of their underhanded ops while exposing the equivalent ones from the […]

  46. R.S. McCain Connects the Dots: Leader of Anti-Limbaugh Effort Brags About Obama Campaign Ties. « The Rhetorican
    June 21st, 2012 @ 2:21 pm

    […] has been connecting a lot of dots lately… Share this:FacebookTwitterLinkedIn […]

  47. Evi L. Bloggerlady
    June 21st, 2012 @ 3:51 pm

    placitas, I prescribe two stiff martinis for you.  No olives.  

  48. Evi L. Bloggerlady
    June 21st, 2012 @ 3:53 pm

    Just don’t give them “bath salts.”  

  49. Datechguy's Blog » Blog Archive » …and the MSM is missing the Kimberlin & Co boat too » Datechguy's Blog
    June 21st, 2012 @ 5:19 pm

    […] and talented Katie Pavlich they are lagging behind the less beautiful but completely unrelenting Robert Stacy McCain Brett Kimberlin became a “client” of Neal Rauhauser in 2011. Rauhauser has described his […]

  50. Wombat_socho
    June 21st, 2012 @ 6:14 pm

     Yeah, but let’s not encourage anyone to indulge in thumpings not previously approved by the State.