It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
The reality is, Iraqis did greet us as liberators.
They do want us there and anyone who disagrees needs to take it up with the millions of iraqis that risked their lives to vote!
Originally posted by Boatphone
I responed to this post before, but I look now and it is gone. Was this put in the trash bin?
Thanks very much for posting these photos; I think it is a real conspiracy that these are not shown more in the media. and are possibly being censored on ATS!!
-- Boat
Originally posted by xmotex
The reality is, Iraqis did greet us as liberators.
Yes, the roadside bomb is simply a badly misunderstood traditional Iraqi greeting ceremony. Like tossing flowers and waving flags, only louder.
They do want us there and anyone who disagrees needs to take it up with the millions of iraqis that risked their lives to vote!
Yes, and they voted mostly for the United Iraqi Alliance, one of whose major campaign platforms was the earliest possible timetable for withdrawal of US forces from Iraq. Another was closer ties with Iran. And yet another was the formalization of Iraq as an Islamic state. Yay
Originally posted by Dronetek
The reality is, Iraqis did greet us as liberators. They do want us there and anyone who disagrees needs to take it up with the millions of iraqis that risked their lives to vote!
- C2 Attack: Any action against any element of the enemy's command and control system.
- Command and Control: The exercise of authority and direction by a properly designated commander over assigned forces in the accomplishment of the mission.
- Counterinformation: Actions dedicated to controlling the information realm.
- Defensive counterinformation: Actions protecting our military information functions from the adversary.
- Direct Information Warfare: Changing the adversary's information without involving the intervening perceptive and analytical functions.
- Indirect Information Warfare: Changing the adversary's information by creating phenomena that the adversary must then observe and analyze.
- Information: Data and instructions.
- Information Attack: Directly corrupting information without visibly changing the physical entity within which it resides.
- Information Function: Any activity involving the acquisition, transmission, storage, or transformation of information.
- Information Operations: Any action involving the acquisition, transmission, storage, or transformation of information that enhances the employment of military forces.
- Information Warfare: Any action to deny, exploit, corrupt, or destroy the enemy's information and its functions; protecting ourselves against those actions; and exploiting our own military information functions.
What a Great Piece of Military Propaganda. I mean, that was really Awesome. I bet some Military PR got a Medal for this Photo presentation.