jump to navigation

Tim Walz: Stolen Valor and the Dishonesty of Claiming Combat Service August 10, 2024

Posted by Chris Mark in Uncategorized.
Tags: , , , , , ,
3 comments

EDIT(I have so little respect for this dummy I had his name as TOM). it is TIM…like…little Timmy the coward….

Recently, the Harris campaign attempted to assuage concerns over Tom Walz’ lying about his service by saying he simply “misspoke”. For those who are not veterans I feel it is appropriate to give some context to his lies. First, “Turn Tail Tom” claims, through the Harris campaign that: “Governor Walz would never insult or undermine any American’s service to this country —” Yet, through his lies he has done exactly this.

Before I go on let me be clear. EVERY veteran who has served our great nation is to be applauded regardless of the job. That $100 million jet does not fly without a technician fixing the computer system. As a former Scout Sniper, if there was not an armorer to keep my rifle in match condition, my job was degraded. While we all like to make jokes, there is a truism in the quote: “Bullets don’t fly without supply”.

Within the veteran community there are three basic groups. Those who have been in direct combat (Combat veterans), those who have served in Combat zones but NOT seen direct combat, and those who are in support roles who have not deployed (in the rear with the gear). For every ‘front line’ or ‘combat’ troop there are about 10 support personnel in the US Military. Only about 10% of the Army, Marines etc. actually are doing the fighting. This is NOT to denigrate those who provide the support rather to show how important those jobs are to the war effort.

Every veteran knows that to be a combat veteran is considered the pinnacle of respect. It is so pronounced in the USMC that the MarineTimes actually wrote an article in 2015 about the infighting called No CAR,No Respect detailing how, within the Marine Corps, those who had earned the Combat Action Ribbon were perceived to look down upon those who had not seen direct combat. In short, Tom Walz did NOT misspeak about having been a war veteran. He intentionally lied about having been in ‘war’. The question is why? We know why. He wanted the respect and cache that comes from putting oneself in harm’s way.

Being a combat veteran is so revered within the military services that each service has specialized medals, ribbons or badges that enable one to immediately identify whether a soldier, sailor, airman, or Marine is a combat veteran. In the USMC and US Navy we are issued a Combat Action Ribbon (CAR). In the Army they are issued either a Combat Infantryman Badge (CIB) or the Combat Action Badge (CAB) and so on for each service.

Tom is a progressive liberal who hates guns. That is fine. By stating his ‘credentials’ (avid hunter (sure he is), war veteran), he is demonstrating his authority on the subject. This is a logical fallacy called appeal to authority. Tom Walz, in a public statement advocating for stricter gun control measures, asserted,

“We can make sure that those weapons of war, that I carried in war, is the only place where those weapons are at.”

This statement was intended to bolster his argument for restricting civilian access to certain firearms by drawing on his purported personal experience in a combat setting. By claiming firsthand knowledge of the destructive power of military-grade weapons, Walz aimed to position himself as an authoritative voice on the issue, suggesting that his experience granted him a unique and legitimate perspective on the dangers of such firearms in civilian hands.

However, it was later revealed that Walz had never served in a combat role, casting serious doubt on the authenticity of his claims. This revelation not only called into question Walz’s integrity but also highlighted the problematic nature of using appeals to authority based on false or exaggerated credentials in policy debates.

I have investigated numerous stolen valor claims and have reported a number of people on the claims. The vast majority of stolen valor claims are for people who simply want to impress a person of the opposite sex. In some cases it becomes more sinister such as in Tom Walz case where he is using the claims of combat earned by few to attempt to demonstrate authority on a subject in which he has no authority.

Shame on the Harris campaign for attempting to divert attention away from Tom Walz’ fraudulent claims of valor. In their defense, the Harris campaign stated: “In making the case for why weapons of war should never be on our streets or in our classrooms, the Governor misspoke. He did handle weapons of war Well, I supposes that makes him a combat veteran. I like fast cars. I have a fast car. I drive a Maserati. Based upon that, I suppose I can tell people I raced in the Monaco Grand Prix and am a race car driver? No, of course not. My ‘handling’ a fast car (BTW…it is NOT a race car any more than the AR 15 Tom is trying to ban is a weapon of war) does not make me a ‘race car driver’ any more than Tom is a war veteran.

He has stolen valor and should apologize personally for his shameful actions.

Chinese Cyber Attacks and Unrestricted Warfare February 1, 2024

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , , , ,
add a comment

I first wrote about this phenomenon in 2012. It is becoming reality. The recent cyber-attacks attributed to the Chinese government on American infrastructure can be analyzed within the conceptual framework of “unrestricted warfare,” a doctrine developed by two PLA Colonels, Qiao Liang and Wang Xiangsui, in response to the perceived military superiority of the United States. This doctrine signifies a strategic shift from traditional, kinetic warfare to a multifaceted approach incorporating a broad spectrum of tactics including economic, political, and PR maneuvers to conduct ‘sub wars’ and ‘pseudo wars’.

At the core of unrestricted warfare is the recognition that the principles of war have evolved. As the authors state, “If we acknowledge that the new principles of war are no longer ‘using armed force to compel the enemy to submit to one’s will,’ but rather are ‘using all means including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests’”[1]. This perspective broadens the scope of warfare to encompass non-traditional methods such as economic manipulation, cyber-attacks, and disinformation campaigns, transcending the conventional battlefield.

The Chinese cyber-attacks on the U.S. infrastructure, as reported in the aforementioned sources, align with this doctrine. These attacks represent a strategic choice to exploit vulnerabilities in critical systems to cause disruption and potential societal panic, without resorting to open military confrontation. This approach fits into the broader pattern of asymmetric threats.

Asymmetric threats, characterized by a disparity in the means and methods between different adversaries, are further defined by three criteria: the involvement of a tactic that one adversary could and would use against another, the unique ability or willingness of the adversary to use such means, and the potential for serious consequences if these means are not countered. In the cybersecurity realm, these threats take on a significant role. A minor actor with basic hacking tools can compel major entities to invest heavily in defense, illustrating the asymmetry in resources and efforts between attackers and defenders.

The Chinese strategy, as evidenced by the cyber-attacks, meets these criteria of asymmetric warfare. It involves tactics that the Chinese government is capable and willing to employ, which the U.S. would not mirror. The potential consequences of these attacks are severe, necessitating significant defensive measures.

Further aligning with the principles of unrestricted warfare, the authors note that unconventional methods can be formidable weapons in modern conflict. They observe, “As we see it, a single man-made stock-market crash, a single computer virus invasion, or a single rumor or scandal that results in a fluctuation in the enemy country’s exchange rates or exposes the leaders of an enemy country on the Internet, all can be included in the ranks of new-concept weapons”[2]. This recognition of non-traditional tactics as weapons underscores the expanded battlefield that now includes economic, political, and technological realms.

In conclusion, the Chinese cyber-attacks on U.S. infrastructure, as part of their broader strategic approach, are indicative of the principles of unrestricted warfare. They represent a calculated move to use asymmetric tactics to undermine U.S. strengths and exploit vulnerabilities, extending the battlefield into the cyber realm. This strategy exemplifies a modern approach to warfare, where the lines between military and non-military means are blurred, and the battleground extends into multiple domains.

Loading the Elevenlabs Text to Speech AudioNative Player…


References:

  1. Qiao Liang and Wang Xiangsui, “Unrestricted Warfare.”
  2. Ibid.

Covid19: “The War God’s Face Has Become Indistinct” – China’s Unlimited Warfare Strategy April 14, 2020

Posted by Chris Mark in cybersecurity, Risk & Risk Management, terrorism.
Tags: , , , , , , , , , ,
add a comment

CT2013UPDATE-  Today (April 15, 2020) Fox News published an article supporting what has been proposed in this post.  Titled“Sources believe coronavirus originated in Wuhan lab as part of China’s efforts to compete with US the article lays out compelling evidence that China was attempting demonstrate that China’s “…efforts to identify and combat viruses are equal too or greater than capabilities of the United States.” The article states that evidence comes from classified, and open source sources and documents.  It further states that:

“…(China) blaming the wet market was an effort by China to deflect blame from the laboratory, along with China’s propaganda efforts targetting the US and Italy.”

For those who have not read Unrestricted Warfare referenced in this post, I would strongly suggest you consider reading.  The Fox News article is directly in line with China’s 1999 strategy of unlimited warfare against the US and European countries.

In 2013, I wrote an article for The Counter Terrorist  Magazine that identified the Chinese strategy of CyberWarfare. You can read the article here.

This followed a seperate article I wrote for the same magazine called “CyberEspionage” that identified China’s efforts to infiltrate the US.  Both identify the Chinese focus on unlimited warfare discussed below.ctmay2012

Today, while reading the news, I came across an article that stated that stated that the US State Department cables (read CIA and Intelligence) has stated that the Covid19 Virus may have originated the Wuhan Viral Lab (WVL) who were testing the Coronavirus in bats.  According to the Washington Post:

“As many have pointed out, there is no evidence that the virus now plaguing the world was engineered; scientists largely agree it came from animals. But that is not the same as saying it didn’t come from the lab, which spent years testing bat coronaviruses in animals, said Xiao Qiang, a research scientist at the School of Information at the University of California at Berkeley.”

No “Evidence” is distinctly different than “They did not do it”.  Keep in mind that in February, 2020, the US Government charged 4 Chinese Military members with the 2017 Equifax breach.

The question should be: “why would the Chinese launch viruses (if they did) and why would they hack US companies?”  The answer is actually pretty straightforward.   If you read the article from 2012, you will get much more information than in this blog post.

In 1990 the US engaged the Iraqi military in the Gulf War.  The Russians (then Soviets) tankmedinaand Chinese watched closely as the US went literally “toe to toe” with the World’s 5th largest standing Army (Iraqi).  96 hours later, the Iraqi Army was soundly defeated.  In particular was the Battle of Medina Ridge (also called the Battle of 73 Easting) fought on Feb 27, 1991. It was an absolute route. This convinced the Chinese that a “linear/kinetic war” with the US was unwinnable.

For this reason they embarked upon a new policy called “Unlimited/Unrestricted warfare”.

This is documented in the book called Unrestricted Warfare.  In first reading the document, I was shocked at what it contained.  In 1999, two Chinese Peoples’ Liberation Army (PLA) Colonels were tasked to write a document titled: Unrestricted Warfare that outlines China’s approach to war with the West.   In short, the document articulates a new definition of warfare that includes using all economic, political, and PR means to fight ‘sub wars’ and ‘pseudo wars’.

While we sit in the US laboring under our definition of warfare, our adversaries are redefining the battlespace.  Here are some quotes from the document:

“If we acknowledge that the new principles of war are no longer “using armed force to compel the enemy to submit to one’s will,” but rather are “using all means including armed force and non-armed force, military and non-military, lethal and non-lethal means to compel the enemy to accept one’s interests.”[i]

“As we see it, a single man-made stock-market crash, a single computer virus invasion, or a single rumor or scandal that results in a fluctuation in the enemy country’s exchange rates or exposes the leaders of an enemy country on the Internet, all can be included in the ranks of new-concept weapons.”[i]

In short, the Chinese manipulating currency, or the press or even paying a Harvard Professor to be an agent can arguably be considered a ‘pseudo war’ consistent with their strategy of unlimited warfare.  As more information becomes available, I would not be surprised to see that this is much more than an “accident” in a lab in Wuhan.  Look at the financial toll it has taken on the World and positions the Chinese to be much larger players.


[i] House of Representatives. (Kindle Locations 325-327). Kindle Edition.

 


[i] Wiangsui Qiao Liang and Wang. Unrestricted warfare. Beijing: PLA Literature and Arts Publishing House; 1999.

A Perspective on Guns & Killing from “A Marine and his Rifle” (Updated 2020) February 25, 2020

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , , , , , , ,
13 comments

SMallPir

“I left the sky in the middle of the night
I hit the deck and I’m ready to fight.
Colt .45 and Kabar by my side
These are the tools that make men die.”

-Infantry Cadence

With the recent political debates raging and ‘gun control’ once again front and center of the Democrat candidate’s platforms, I felt it was appropriate to update and republish for 2020.   This post is not a position on gun control rather it is intended give some insight into a side of the issue few outside of specialized jobs probably recognize or acknowledge.  That of the human weapon. (more…)

War Heroes, Counts, Magistrates, and Lunatics…thanks Ancestry.com! June 16, 2017

Posted by Chris Mark in Uncategorized.
Tags: , , , , , , , , , ,
5 comments

EHM_graveI grew up in a broken home and had little interest or knowledge of my genetic family when I was growing up.  Until recently there were few ways to trace one’s lineage with any degree of accuracy.  In 2010 I joined Ancestry.com.  it was still pretty nascent and I didn’t get much value from the limited information available.  Last week I had an epiphany and looked up the obituary of one of the grandparents with which I was familiar.  It had just enough information that I started looking.  I went back to Ancestry.com and BOOM! I was on fire!  In the 7 years I was away from Ancestry.com there were volumes of new information added!  In two days I found over 160 direct relatives.  I had always assumed my relatives had come to the US like many Irish immigrants during the Great Famine of 1845-1852.  I guessed (incorrectly) that my relatives were farming folk from Ireland.  The real story is much more interested!

The first relative I looked up was my maternal grandfather Emery Harry Montgomery.  He was a Colonel in the US Airforce (previously the Army Air Corps) and had served with distinction in WWII where he flew P-47s over Europe and was awarded 4 Air Medals and in 1944 earned a Distinguished Flying Cross!  Colonel Montgomery was the CO of the 2nd Jet squadron in the US and was killed in 1958 while flying an F80. (more…)