- published: 12 Jul 2015
- views: 1092
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination.
Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations and other broader areas of interest. Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war and during a war itself.
Intelligence has been defined in many different ways including one's capacity for logic, abstract thought, understanding, self-awareness, communication, learning, emotional knowledge, memory, planning, creativity and problem solving. It can be more generally described as the ability to perceive information, and retain it as knowledge to be applied towards adaptive behaviors within an environment.
Intelligence is most widely studied in humans, but has also been observed in non-human animals and in plants. Artificial intelligence is intelligence in machines. (i.e., software)
Within the discipline of psychology, various approaches to human intelligence have been adopted. The psychometric approach is especially familiar to the general public, as well as being the most researched and by far the most widely used in practical settings.
Intelligence derives from the Latin verb intelligere, to comprehend or perceive. A form of this verb, intellectus, became the medieval technical term for understanding, and a translation for the Greek philosophical term nous. This term was however strongly linked to the metaphysical and cosmological theories of teleological scholasticism, including theories of the immortality of the soul, and the concept of the Active Intellect (also known as the Active Intelligence). This entire approach to the study of nature was strongly rejected by the early modern philosophers such as Francis Bacon, Thomas Hobbes, John Locke, and David Hume, all of whom preferred the word "understanding" in their English philosophical works. Hobbes for example, in his Latin De Corpore, used "intellectus intelligit" (translated in the English version as "the understanding understandeth") as a typical example of a logical absurdity. The term "intelligence" has therefore become less common in English language philosophy, but it has later been taken up (with the scholastic theories which it now implies) in more contemporary psychology.
The United States Army (USA) is the largest branch of the United States Armed Forces and performs land-based military operations. It is one of the seven uniformed services of the United States, and is designated as the Army of the United States in the United States Constitution, Article 2, Section 2, Clause 1 and United States Code, Title 10, Subtitle B, Chapter 301, Section 3001. As the largest and senior branch of the U.S. military, the modern U.S. Army has its roots in the Continental Army, which was formed (14 June 1775) to fight the American Revolutionary War (1775–83)—before the U.S. was established as a country. After the Revolutionary War, the Congress of the Confederation created the United States Army on 3 June 1784, to replace the disbanded Continental Army. The United States Army considers itself descended from the Continental Army, and dates its institutional inception from the origin of that armed force in 1775.
The military, also called the armed forces, are forces authorized to use deadly force, and weapons, to support the interests of the state and some or all of its citizens. The task of the military is usually defined as defense of the state and its citizens, and the prosecution of war against another state. The military may also have additional sanctioned and non-sanctioned functions within a society, including, the promotion of a political agenda, protecting corporate economic interests, internal population control, construction, emergency services, social ceremonies, and guarding important areas. The military can also function as a discrete subculture within a larger civil society, through the development of separate infrastructures, which may include housing, schools, utilities, food production and banking.
The profession of soldiering as part of a military is older than recorded history itself. Some of the most enduring images of the classical antiquity portray the power and feats of its military leaders. The Battle of Kadesh in 1274 BC was one of the defining points of Pharaoh Ramesses II's reign and is celebrated in bas-relief on his monuments. A thousand years later the first emperor of unified China, Qin Shi Huang, was so determined to impress the gods with his military might that he was buried with an army of terracotta soldiers. The Romans were dedicated to military matters, leaving to posterity many treatises and writings as well as a large number of lavishly carved triumphal arches and victory columns.
An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information and intelligence in support of law enforcement, national security, military, and foreign policy objectives. Means of information gathering are both overt and covert and may include espionage, communication interception, cryptanalysis, cooperation with other institutions, and evaluation of public sources. The assembly and propagation of this information is known as intelligence analysis or intelligence assessment.
Intelligence agencies can provide the following services for their national governments.
Originally published on 13 June, 2015 Sign up for a free trial of News Direct's animated news graphics at http://newsdirect.nma.com.tw/Reuters.aspx ------------------------------------------------------------------------------------------------ Hackers with suspected links to the Chinese government appear to have accessed personal information on US intelligence and military personnel, US officials said. Details emerged of a major hack of up to four million federal government employees’ personal information last week, but now officials have disclosed information about a second breach. The agency involved, the Office of Personnel Management (OPM), has yet to comment on the reports. US officials did not acknowledge the second hack at the time of the initial announcement. “During t...
Russell Targ, a laser physicist, cofounded the remote viewing research program at SRI International. He is coauthor Mind Reach, The Mind Race, Miracles of Mind, The Heart of the Mind, and The End of Suffering. He is author of Limitless Mind and The Reality of ESP: A Physicist's Proof of Psychic Abilities. He is also coeditor of the anthology, Mind At Large. Here he discusses several instances in which the military intelligence remote viewing program that ran for twenty years until 1996 produced significant results. These included information regarding a sick hostage during the Iranian crisis, accurate descriptions of technical facilities in the former Soviet Union, and the location of a missing Soviet era spy plane. New Thinking Allowed host, Jeffrey Mishlove, PhD, is author of The Roots...
Special forces military intelligence — a set of measures undertaken by the state in the face of the military Department (or his staff), primarily for the acquisition and processing of data about existing or probable enemy, its military resources, military capabilities and vulnerabilities, as well as on the theatre of war • MUSIC - silencyde - shroud royalty promotions • Моя группа ВК https://vk.com/militaryforcesxxicentury • tweeter - https://twitter.com/spetsnazXXL • instagram - https://goo.gl/nDVXkH • Google + - https://goo.gl/avqL7Q • Facebook - https://www.facebook.com/MilitaryForcesWorldTV/ • subscribe - www.youtube.com/c/MilitaryForcesXXICentury • All channel's video https://goo.gl/avqL7Q • Channel #Military_Forces_XXI: will show you • Armed Forces of the countries of the World •...
Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4 US Army Training Film playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3 more at http://quickfound.net/links/military_news_and_links.html "This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection. Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it. US Army Training Film TF30-3030 Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound. Public domain film from the US Nationa...
Killer drone arms, articial intelligence an increasingly real fiction, Social and Smart Phone Facial Recognition, Smart swarms, Warning ! SUBSCRIBE OUR CHANNEL It’s hard to believe how far we’ve come. We launched just a few years ago with our surveillance drones, and in this short amount of time, we’ve retooled cutting-edge artificial intelligence and machine learning techniques, such as deep learning and convolution neural networks, into hardware systems that governments and peace-keeping agencies can use to keep their troops safe. No more sending our brave patriots home in coffins. Now the artificial intelligence does all of the work. Our autonomous weapons are small, fast, accurate, and unstoppable. And they are just the beginning. Smart swarms. Adaptive adversarial learning. On-the-fi...
What is MILITARY INTELLIGENCE? What does MILITARY INTELLIGENCE mean? MILITARY INTELLIGENCE meaning. Military intelligence is a military discipline that uses information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. In order to provide an analysis, the commander's information requirements are first identified. These information requirements are then incorporated into intelligence collection, analysis, and dissemination. Areas of study may include the operational environment, hostile, friendly and neutral forces, the civili...
WASHINGTON D.C. —Hackers with suspected links to the Chinese government appear to have accessed personal information on US intelligence and military personnel, US officials said. Details emerged of a major hack of up to four million federal government employees’ personal information last week, but now officials have disclosed information about a second breach. The agency involved, the Office of Personnel Management (OPM), has yet to comment on the reports. US officials did not acknowledge the second hack at the time of the initial announcement. “During the investigation into the cyber-intrusion of OPM that compromised personnel records of current and former federal employees announced last week, investigators became aware of an additional intrusion affecting different OPM systems ...
NSA : Documentary on the Secret Intelligence Agency NSA . 2013 2014 This documentary as well as all of the rest of these documentaries shown here are about important times and figures in history, historic places and people, archaeology, science, conspiracy theories, and education. The Topics of these video documentaries cover just about everything including ancient history, Rome, Greece, Egypt, science, technology, nature, plants, animals, wildlife, environmental issues, global warming, natural disasters, planet earth, the solar system, the universe, modern physics, World wars, battles, military and combat technology, current events, education, biographies, television, archaeology, Illuminati, Area 51, crime, mafia, serial killers, paranormal, supernatural, cults, government cover-ups...
The U.S. Army is a leader in Geospatial technology creating new capabilities while also using existing technologies to collect data to develop imagery and maps. The Army is developing computer software and hardware to support tactical challenges as well as supporting humanitarian missions.
Top-secret cache of army intelligence data left exposed on the internet The U.S. Secret Service says an individual has been taken into custody after attempting to jump a se...
Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission requirements or responding to focused questions as part of the operational or campaign planning activity. In order to provide an informed analysis, the commander's information requirements are first identified. These information requirements are then incorporated into a process of intelligence collection, analysis and dissemination. Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of c...
Joggers have been using a fitness app in sensitive intelligence and military locations - including where the Royal Navy stores its nuclear weapons, it emerged today.A heatmap of GPS data recorded by Strava, a mobile app which allows users to track their jogging routes, shows runners using it at HM Naval Base Clyde.One of the maps posted on the app from within the base near Glasgow, also known as Faslane, is even captioned: 'You shouldn't be using Strava here.'The heatmaps recorded by Strava show activity in and around various military bases around the world, suggesting users are soldiers on active duty.People who create a free account can find other users who regularly use certain routes, potentially alerting terrorists or foreign powers to soldiers on active duty.The HMNB Clyde map was in...
Get more out of your network and keep it protected with smarter cybersecurity from Viasat. https://www.viasat.com/secure Across the world, millions of devices are connected to the Internet. Each of those devices and the networks they connect to are perpetually under attack. Some attacks are small, just testing the waters to identify vulnerabilities. Others are big, taking down entire networks and exploiting stolen data. With petabytes of data at our fingertips and high-speed cyber analytics, we can identify potential threats that would normally go unnoticed. As a worldwide Internet service provider who also secures almost half of our nation’s classified networks, we know the cyber-attacks hijacking personal computers and mobile devices have similar characteristics as those threateni...
US hacking Military and intelligence data 'accessed' Hackers with suspected links to China appear to have accessed sensitive data on US intelligence and military personnel, American officials say.
Hackers with suspected links to China appear to have accessed sensitive data on US intelligence and military personnel, American officials say that it is feared that the attack could leave US security personnel or their families open to blackmail. A 127-page vetting document called Standard Form 86 may have been accessed. With the answers to very personal questions usually kept confidential. A White House statement said investigators had a "high degree of confidence" that background information on government employees had been accessed. It is also believed the breach of personal data of US government workers announced last week may be far larger than previously reported. http://www.bbc.co.uk/news/world-us-canada-33120405#sa-ns_mchannel=rss&ns;_source=PublicRSS20-sa http://www.wochit.com T...
Dimension Data Belgium spoke to Kanaal Z regarding the plans of the Belgian Military Intelligence Services to hire 200 specialist to better arm themselves against cyberattacks. A good thing, taking into account the ever evolving threat landscape, ensuring the proper protection of such critical infrastructure is only going to gain even more importance. The challenge lies in finding and keeping these resources, as they will have to find and hire profiles which are already scarce and thus high in demand, whilst competing against what the private sector has to offer. Next to implementing, monitoring and managing security controls for our various clients through our Professional and Managed Services, Dimension Data also has an experienced and advanced Penetration Testing and Red-Team Test...
About the Presentation Modern intelligence analysts must generate and direct intelligence that supports the pace of tactical operations for a modular force with decentralized decision-making. Digital collection platforms, information systems, analytical software, and connectivity at the tactical level are useful but insufficient. Analysts need training in data analysis fundamentals to understand how to leverage these systems to support tactical mission planning and decision-making. This type of analysis uses systems design tools to: examine and model the design of military operations; define the analyst’s required capability in the context of tactical operations; explore, revise, and assess components of intelligence competency; assess the relative costs of competency gaps; and recommen...
Retired Nampa Police officer Chris Rowe talks about his journey from serving in the British Military Intelligence to being a Nampa Police officer for 22 years.
GPS data created by millions of people who use mobile devices or apps to track their exercise might also be revealing sensitive national security information. A 20-year-old Australian student discovered the locations of bases where military forces and intelligence services exercise by studying heat maps. John Yang talks to Zack Whittaker of ZDNet.
Advanced Military Communication and Intelligence Video from Military suppliers and news http://www.armedforces-int.com/video/advanced-military-communication-and-intelligence.html Military operations require high levels of communication and advanced intelligence. Saab provides a modern solution utilizing long range sensors and the ability to process mission critical information in real time for use across the battlefield. Saab Microwave Systems is Saab´s company for sensors and information networks primarily acting on the defense market. We develop solutions that provide customers with information superiority and for safety in the society. This encompasses advanced airborne, ground-based and marine radar, as well as customer-adapted networking information systems. We are also well positio...
Intelligence & Espionage playlist: https://www.youtube.com/playlist?list=PL190891145FBF33D4 US Army Training Film playlist: https://www.youtube.com/playlist?list=PL0C7C6CCF1C0DEBB3 more at http://quickfound.net/links/military_news_and_links.html "This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection. Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it. US Army Training Film TF30-3030 Reupload of a previously uploaded film, in one piece instead of multiple parts, and with improved video & sound. Public domain film from the US Nationa...
About the Presentation Modern intelligence analysts must generate and direct intelligence that supports the pace of tactical operations for a modular force with decentralized decision-making. Digital collection platforms, information systems, analytical software, and connectivity at the tactical level are useful but insufficient. Analysts need training in data analysis fundamentals to understand how to leverage these systems to support tactical mission planning and decision-making. This type of analysis uses systems design tools to: examine and model the design of military operations; define the analyst’s required capability in the context of tactical operations; explore, revise, and assess components of intelligence competency; assess the relative costs of competency gaps; and recommen...
Russell Targ, a laser physicist, cofounded the remote viewing research program at SRI International. He is coauthor Mind Reach, The Mind Race, Miracles of Mind, The Heart of the Mind, and The End of Suffering. He is author of Limitless Mind and The Reality of ESP: A Physicist's Proof of Psychic Abilities. He is also coeditor of the anthology, Mind At Large. Here he discusses several instances in which the military intelligence remote viewing program that ran for twenty years until 1996 produced significant results. These included information regarding a sick hostage during the Iranian crisis, accurate descriptions of technical facilities in the former Soviet Union, and the location of a missing Soviet era spy plane. New Thinking Allowed host, Jeffrey Mishlove, PhD, is author of The Roots...
BREAKOUT SESSION A: HOW BIG DATA IS CREATING THE MILITARY OF THE FUTURE Keynote: Dr. Jason Matheny - Director, Intelligence Advanced Research Projects Activity (IARPA) Presentation by MarkLogic: Alex Isaac - National Security Programs, MarkLogic Corporation Panel Session: Dr. Michael Schoenbaum - Senior Advisor for Mental Health Services, Epidemiology, and Economics, Office of Science Policy, Planning and Communication, National Institute of Mental Health Moderator: Patrick Tucker - Technology Editor, Defense One
Join Greg Carlwood of The Higherside Chats podcast as he welcomes back Mark Devlin, author of the massive all encompassing bible on the crossroads of conspiracy and pop culture, his excellent work, Musical Truth. With several unexplored rabbitholes in this realm left over from his first appearance, Mark returns to pick up where he left off. It's no secret that most major industries that play a role in society serve some purpose for the string pullers: 1:50 Last time Greg and Mark talked about how the music industry is used for control of both the artists and the audience. Listen as Mark expands on the origins of this manipulation and who the characters are behind it and whether the music industry is as organic as presented, or if it is a military intelligence think-tank operation from th...
NSA : Documentary on the Secret Intelligence Agency NSA . 2013 2014 This documentary as well as all of the rest of these documentaries shown here are about important times and figures in history, historic places and people, archaeology, science, conspiracy theories, and education. The Topics of these video documentaries cover just about everything including ancient history, Rome, Greece, Egypt, science, technology, nature, plants, animals, wildlife, environmental issues, global warming, natural disasters, planet earth, the solar system, the universe, modern physics, World wars, battles, military and combat technology, current events, education, biographies, television, archaeology, Illuminati, Area 51, crime, mafia, serial killers, paranormal, supernatural, cults, government cover-ups...
Register for the 2018 Cyber Threat Intelligence Summit: http://www.sans.org/u/wOQ need to stop re-inventing the wheel. Intelligence collection, analysis and dissemination methodologies have existed for hundreds, in-fact thousands of years. Designed, honed and perfected by some brilliant analysts and operators, the cyber intelligence industry needs to embrace conventional analysis methodologies to better understand and predict the threat landscape in which they operate. Predominately focused on methods used by British and US agencies and Militaries the talk looks to identify various methods used to help better understand the intelligence picture. From back-casting to cones of plausibility; from analysis of competing hypothesis to breaking the mirror, there are methods that exist to b...
Strategic intelligence (STRATINT) pertains to the collection, processing, analysis, and dissemination of intelligence that is required for forming policy and military plans at the national and international level. Much of the information needed for strategic reflections comes from Open Source Intelligence.[1] Other sources include traditional HUMINT (especially in recent years), Signals intelligence including ELINT, MASINT which overlaps with SIGINT/ELINT to some degree, and 'National technical means of verification' (e.g. spysats). Strategic intelligence pertains to the following system of abilities that, according to Michael Maccoby, characterize some of the most successful leaders in business and government:[2] foresight, the ability to understand trends that present threats or opport...
Since its inception in 1952, the National Security Agency has been shrouded in secrecy; for years the White House denied its very existence. For the first time since 9/11 changed everything, cameras go beyond the closed doors of the NSA, deep inside the agency's over 2 million square foot top-secret compound. Intelligence organization of the United States government, responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes – a discipline known as signals intelligence (SIGINT). NSA is concurrently charged with protection of U.S. government communications and information systems against penetration and network warfare. Although many of NSA's programs rely on "passive" electronic collection, the agency is...
more at http://quickfound.net/links/military_news_and_links.html "Exposes the worldwide operation of the Sino-Soviet espionage system and shows how Communist agents used any means to obtain vital information from military personnel. Reconstructs three actual cases to demonstrate various facets of espionage techniques. Explains how agents of different nationalities probe for vulnerable areas, such as loneliness, indebtedness, fast money, sex and the sporting life. Portrays the agent as he subtly approaches, ensnares and involves his victim until it is too late for the victim to retreat. Purpose: Information on communist espionage methods." Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and mild video noise reduct...
Discussing using the military's "OODA" method to turn your threat data into actual intelligence, and act on it.
Q Anon 10/28 & 10/29 Breadcrumb Analysis|Gourmet Mushrooms|Clinton Foundation|Soros|Military Intelligence|Uranium One|Operation Mockingbird Thanks to all of the 4chan, 8chan, youtube, email, and reddit analysts for sharing their work.
22C3: Private Investigations The European Hacker Conference The 22nd Chaos Communication Congress (22C3) is a four-day conference on technology, society and utopia. The Congress offers lectures and workshops on a multitude of topics including (but not limited to) information technology, IT-security, internet, cryptography and generally a critical-creative attitude towards technology and the discussion about the effects of technological advances on society.
For the past thirty years, the United States government has secretly trained a select corps of militarypersonnel in the art of "remote viewing" -- the psychic ability to perceive the thoughts and experiences of others through the power of the human mind . . . . Now, for the first time, Lyn Buchanan -- a world-renowned expert on remote viewing and its potential -- tells the complete, candid story of his experiences. Assigned for nearly a decade to a clandestine U.S. Army intelligence group, Buchanan trained military personnel who utilized their inherent psychic abilities as a data-collection tool during the Iran hostage crisis, the Chernobyl disaster, and the Gulf War. In this incredible account, Buchanan tells how he was selected for his unique psychic abilities, and how he was transformed...
more at http://quickfound.net/links/military_news_and_links.html "The Enemy Agent and You - National Security Council. Central Intelligence Agency... This U.S. Army film discusses security awareness and responsibilities in relation to overseas travel." Covers bugging, honey traps, etc. DOD film # DOD-IS 7 see also: Espionage Target: You (1964) https://www.youtube.com/watch?v=-YRIygu_13w Public domain film from the US National Archives, slightly cropped to remove uneven edges, with the aspect ratio corrected, and mild video noise reduction applied. The soundtrack was also processed with volume normalization, noise reduction, clipping reduction, and/or equalization (the resulting sound, though not perfect, is far less noisy than the original). http://creativecommons.org/licenses/by-sa/3...
The lecture focuses on highlighting the role of data across the problem-solving and quality-improvement spectrum. Prof. Curry introduces the importance of data as an integral component of any healthcare system rather than a programmatic end piece. Dr. Krumholz further discusses how to use data as part of the larger national quality agenda to assess healthcare quality, identification of and advocacy for a quality measure, and the science necessary to support data and research infrastructure.
This is the technology being deployed on the public globablly... what Silicon Valley marketers call Social Networks & Search Engines, but what is really a highly granular means of control of the users inside the networks by those who design & administer these systems..... "By efficiently netting and synchronizing sensors in real time and combining detections, it is possible to increase the probability of detecting and identifying a target, while also reducing the time it takes to accurately locate targets by more than 90%. This refined information updates a common, shared-network Objectivity database so that the problem of multiple reports on a single target is dramatically reduced." Gary Davis Director of the NCCT Program L-3 ComCept http://www.bulldogsolutions.net/Objectivity/OBJ1206...
Outsourcing intelligence is a method by which a country gathers information using non-governmental employees. In the United States of America, approximately 51% of intelligence gatherers are contractors instead of governmental employees. About the book: https://www.amazon.com/gp/product/0743282256/ref=as_li_tl?ie=UTF8&camp;=1789&creative;=9325&creativeASIN;=0743282256&linkCode;=as2&tag;=tra0c7-20&linkId;=09e1c749ec8a6b94ef56192aac930d8f The government of a country may outsource intelligence gathering that may not be obtainable through other means, where the only way may be through human intelligence such as the CIA's National Clandestine Service (NCS). It may mean outsourcing to foreign nationals from a country of interest, they may outsource to private companies as well to gather the specified...
1961 US Army Training Film Military Intelligence Specialists "This film focuses on the interviewers, interpreters, and photo reviewer specialists that comprise G-2 military intelligence." Although an Army film, it entered the National Archives from the CIA film collection. Lip sync was lost in a few places in this film. It was this way on the original, and is too inconsistent to be worth the effort to try to correct it. US Army Training Film TF30-3030 Military intelligence is a military discipline that exploits a number of information collection and analysis approaches to provide guidance and direction to commanders in support of their decisions. This is achieved by providing an assessment of available data from a wide range of sources, directed towards the commanders' mission require...
[Akrobatik]
Don't be mad at me, America created this bloodlust
it's time to be prepared for war, heads up when the scuds bust
you can fire your missiles, there no match for my New England patriot
the fear wells up inside of ya'
as they whistle past your tenament, my president set the precedent
that we don't need concrete evidence or no allied troops to represent
I'll bust your shit unilaterally
and any damage I suffer that's just collateral b
more fuel for the fire
but if you set fire to the fuel the stakes become higher
fourty-eight hours bitch bounce now
turn on the television if you wanna see the fucking countdown
counter attack I'm not having it
my smart bombs are sixty-six point six percent accurate
my leaders name's another word for pussy
slander and propaganda got me fucked up so don't push me
I'm full of savagery, so you don't wanna battle me
I kill the innocent and call it incidental casualties
your minds boggled, I got you slow to grab the throttle
I caught you sleeping with the help of my night vision goggles
I guarantee you dumb fucks won't sleep on me again
I see you sitting back cocky like Saddam in his den
I'm bombing your men, bombing your women, bombing your kids
check the box score on CNN to see what I did, bitch!
[Hook]
My rap flows militant, atten-chun!
the general, commander of the regiment
leveling your settlement the chief speaks eloquent
command presidents, with military intelligence. [x2]
[Virtuoso]
This is V-Day, we may need reinforcements for the fortress
their forces are drowning in an ocean of corpses
while I fly high above birds eye the war eagle
your feeble slash flows that blow like torpedoes
with our limbs aching, march from where we've been stationed
for invasion to capture and skin
we're making expansions to the shores which are foreign
we're going to war in the name of J.P. Morgan
Gates and Rockerfeller they get shot the hell up
while looters rush, grab the artifacts and rob Iraq of
the culture, from which the vulture stole the Jesus sculpture
knowing that if Christ was alive he would revolt ta'
see you fight for who could use his name in vain to tame the same
people that you claim you save
you gave us purple hearts and call them medals of bravery
but it feels more like I got shot for modern slavery
fuck a war! cause I got my legs blown off
while George Bush junior and senior were playing golf
for who would I vote, when politicians dream of spittin' two in my throat
leaving me sitting by a suicide note
send wire fuck the empire tell the men fire
I recommend dire consequence for them liars
soldier my flame thrower burn 'em to embers
then return 'em to sender with my terms of surrender
[Hook: x2]
[V:] The war horse, more force than an A-bomb
we take arms, cremating your body with napalm
we take on many
[A:] anybody get slayed
[V:] for every dollar on weapons, we spend a penny on AIDS
[A:] fuck research
cause if you ask me Virtch we already got the cure
but turned it down cause it works better on the poor
I think we got it fucked up for sure
intelligence is more
than finding out the oppositions plans for war
[V:] if the whole world respected love over fear
then a brother would hear your point without a slug in the ear
what kind of holy war has devils on both sides
who spend money on missiles not medical supplies
instead of stealth bombers if you spent the wealth on hospitals
[A:] Maybe every nation wouldn't want to take a shot at you
[V:] so the new battle plan is respect life in all elements
A&V;:now that's military intelligence!