Tactical Wisdom
News • Politics • Preparedness
Book Review: Phantom Soldier
H John Poole
January 27, 2023
Guest contributors: TacticalWisdom
post photo preview
Book Cover

Next up in our reviews of H John Poole tactical manuals is Phantom Soldier, The Enemy's ANswer to US Firepower.  While The Tiger's Way focused on small unit tactics, Phantom Soldier focused on how a smaller, less technically able force can survive and thrive against the vast precision firepower that the United States can bring to bear.  The key examples revolve around the People's Liberation Army in Korea, and the Vietnamese forces against both the US and the Chinese.

Affiliate Link to buy book: https://amzn.to/3WIfMA1

Three key battles are analyzed for context: The Battle of North Ridge during the Korean War, The Battle for Hue CIty, and Iwo Jima.  Each gave concrete examples of how to survive our combined arms onslaughts, how to approach invisibly, and then seemingly disappear.

I can think of at least one scenario in which a small force might need to use the tactics involved in this book...

Part One of the book discusses the history of Eastern warfare and how well they've done against Western armies.  China has been writing about military strategy longer than most of the world has been writing at all.  At the heart of the Eastern way of war is deception, while the Western way of war is brute force.  Truthfully, Western forces determine wins and losses by body counts and by who holds the ground after a battle, but Eastern forces decide who won or lost based upon strategic effect.  

A good example from the book is Vietnam.  Imagine you are holding the perimeter of your firebase and group of Vietcong attack.  While repelling them, your command post blows up and the enemy withdraws.  The US would consider that a US win, because they held the ground.  However, it was a win for the Eastern force, because they sent in two sappers who blew up the strategic target, the CP.  Which one matters?  The CP casualties matter more than who holds the base.

Part Two goes into tactical differences, and how the Eastern side pulls off their magic.  It discusses why Eastern patrols are generally more effective than Western.  Eastern troops have better-trained point men (see TW-04 for this), their superior camouflage skills, their willingness to break contact rather than fight a lopsided battle, and their willingness to crawl in the dirt (yes, really).  The book discusses a story about Guadalcanal, where two Marines saw a Japanese point team crawl past their OP.  Western forces patrol by walking.  Who will see the other first?  The Eastern force.

As far as the willingness to break contact, Eastern forces enable their NCOs to decide to withdraw.  Western forces will maintain contact and try to "develop" the situation. In contrast, Eastern forces understand that not every fight is worth having.  Similar to the Vikings, the Eastern armies know that it is better to withdraw and fight another day than to waste resources fighting over terrain that isn't important.

Poole goes into the difference between the Western "chance contact " drill of a single envelopment and the Eastern drill of DOUBLE envelopment.  Want to know more?  Buy the book using the affiliate link above.

When on the defense, Western forces tend to create well-defined perimeters with linear trenches and fencing.  The Eastern defender prefers to burrow.  He will build underground forts and partially open trenches, connected by complete underground bases.  These underground facilities are what allow them to survive our high-tech bombardment and seem to disappear.  The book goes into deep detail on this.

During the review of the Battle of North Ridge, Poole describes the Eastern method of attack by infiltration and probing for weak areas.

As far as ambushes, we all love to talk about L-Shaped ambushes, despite their less than stellar record in actual combat.  However, Eastern forces employ U or V shaped ambushes to trap the victim in a fire sack with fire coming from multiple directions at once.  They generally use one or two running scouts to bait the targeted victim into the fire sack.

Eastern forces, unlike their Western counterparts, generally travel in smaller groups and under overhead cover to negate our tech advantage.  We tend to send large columns along the road.  That's how they seem to arrive out of nowhere.

That's the same tactic the VC and NVA used to infiltrate Hue City during the Tet Offensive.  By infiltrating in small numbers, they were able to seize the Citadel without having to fight their way to it.  Unlike the Western way of attacking the outskirts and then pushing towards the urban center, The Eastern attacker beings downtown and then pushes towards the edge of town.

Through some specific urban tactics covered in the book that you should learn, the NVA was able to hold the Citadel for 3 weeks.  At the end of that, they seemed to vanish.  It's likely that they used the sewer to escape.

Part Three discusses how American small units must change to stay ahead.

The book wraps up with an appendix of Eastern Tactical Wisdom.  The appendix references Sun Tzu and several other Chinese works on military strategy.

You need to include the Phantom Soldier in your Tactical Wisdom library.

 

community logo
Join the Tactical Wisdom Community
To read more articles like this, sign up and join my community today
2
What else you may like…
Videos
Posts
Articles
Timeline Cleanse

Time for a timeline Cleanse before WW3 kicks off.

00:00:10
INTEL UPDATE - GUYANA

This appears to be video from the fighting on the Venezuela-Guyana border.

00:00:36
Quick Thoughts on GPS Units

Here are a few quick thoughts on GPS units.

1. Get older ones - they may have less features, but they also don't track you for "your safety".

2. You don't need a camera on it. Ever.

3. There are guys on Ebay who specialize in flashing old units with new software. I just bought a "new old stock" one that a guy upgraded.

4. They will also sell you all the newest GPS Topo maps at reduced prices. I have like 5 different map areas on one SD card.

5. Get one that takes an SD card and force the unit to save all your tracks and points to the SD. That way in the event of potential compromise, you can pull the SD Card and either bury it or toss it, and they can't exploit your GPS to find your camp, home, base, etc.

00:04:55
INTEL BRIEF- BALTIC

The CLion1 communications cable has been cut for the third time. The cable connects Gotland to Sweden.

It was also cut in November and December.

February 17, 2025

Another regional jet, the same type as in D.C, crashes. This time in Toronto. Snowy conditions on the runway and strong gusty crosswinds. The aircraft flipped, tore off the wings & tail, and briefly caught fire.

All aboard survived with nineteen injuries, two of which are critical. One of the critical was a lap child (i.e. a parent holding a baby). As one who has twenty five years flying for the airlines, if you are holding a baby instead of buying an extra seat & using a child seat, you are a dumbass. Held children in an aircraft accident become projectiles. DON'T do it.

Insider scuttlebutt has it that the First Officer was a new hire with little flight time and possibly was still undergoing her initial checkout training. Probably not the best judgement to have a newbie conduct the landing in such conditions.

Beware, due to the pilot shortage there are many low time pilots at all of the carriers, in both seats.

Below is a link to a video shot by a dumbass passenger shot WHILE ...

INTEL BRIEF - Beirut Fighting

A UNIFIL Convoy was struck by Hezbollah and IRGC forces near Beirut International.

The Deputy Commander has been wounded along with several others. At least one vehicle was set on fire.

post photo preview
Partisan Logistics

This article is an add-on to the most recent article at tactical-wisdom.com.  In addition to having your own 14 days of portbale supplies, you need some sort of clandestine resupply network if you intend to fight as a partisan, resisting some type of oppresive force (Dear feds: The CHINESE).

Eric Robert Rudoplh, the Olympic Park Bomber, hid from authorities in the wild for months, despite them having a clear starting point for his evasion.  Now, we're not idolizing Rudoplh, he was a terrorist, but his tactics made him a folk hero in his area.  Rudolph was able to evade by living off the supplies he carried, his gear, and the land.  The ONLY reason he got caught was because he ran out of food and without a support network, he resorted to dumpster diving, and thus was captured on video, giving the authorities a fresh and recent start point.

You can avoid this by setting up some of the techniques we're about to discuss.  However, this is the point where I tell you that this training isn't free.  You must be a paid supporter to read the rest.

 

Only for Supporters
To read the rest of this article and access other paid content, you must be a supporter
Read full Article
post photo preview
Book Review: The Prepper's Guide to Post-Disaster Communications
Aden Tate

Amazon Purchase Link: Prepper's Guide

Aden is a friend of mine, but he didn't ask me to review this and doesn't even know I'm doing it.  I'm sneaky like that.

I started this book long ago, but my travel schedule and move put reading on the back burner.  However, the communications issues we faced in the aftermath of back to back hurricanes had me thinking I'd better break this out and get to work.

The cool thing is that Aden, also known as the King of the South (just ask him), has a really fun writing style and is easy to read.  Once I got into the meat of the book, I couldn't stop reading it. His hand-drawn cartoons are better than mine (shocking, I know) and actually make the book more fun.

Aden discusses practical, real-world use of radio in all it's forms in a post-disaster or Without Rule of Law environment.  He breaks down the physics of radio and explains in simple terms all of the various types of radios.  For example, he discusses software-defined radio (SDR), digital vs analog, HF radio, VHF/UHF radio and all of their uses. He discusses how to incorporate directional antennas, spectrum analyzers, and scanners into your intelligence collection plan.

Aden uses several real-world examples to illustrate his point.  One of the best chapters is on how to use radios to provide early warning for an underground church meeting. He delves into recon and intelligence skills to supplement your radios.

He includes a series of training exercises and thought questions designed to help you think about your radio and communications plans.  The appendix contains a list of frequencies to monitor during emergencies.

The true indicator of how smart a man is is how much agrees with you.  In this book, Aden recommends taking NC Scout's RTO course several itmes, as well as recommending his book.  Since I feel the same way, Aden is clearly a genius.

I highly recommend this book.

 

 

Read full Article
post photo preview
GroundRod 1 Course Review

Earlier this month, I hosted K from Combat Studies Group.  He held a GroundRod Level 1 course here at Camp Ponderosa.  A good number of guys came and we learned a ton about digital privacy and how to defeat the surveillance state.  The guys loved the location here as well as K's outstanding content.

A few weeks ago, NC Scout said during a podcast that if you can only afford to take one class this year, you should start with GroundRod.  He is 100% correct.  Tightening up your digital tradecraft and reducing your online footprint is worth far more than K charges.

Normally, this is where I'd say you need to be a paid subscriber to learn more, but I feel like this is so vital and I'd like to convince others to sign up as monthly supporters.  Consider this a free preveiw of the types of studies, analysis, and reviews that we do over here.  It's worth the $5 a month.  We do video training, intelligence reporting and analysis, and reviews of books, gear, and classes.

I'm not going to give away any of K's content, but we are going to go over some of the topics.

The course series (4 classes) covers information security, communications security, personal security, escape & evasion, and tradecraft.  GroundRod 1 is concerns with the first two, as well as digital tradecraft.  K drew an interesting Venn diagram highlighting that the class covers the intersection of privacy, security, and anonymity.

We talked about the threat environment involving not just government activity, but also corporations and criminals.  An interesting note is that the Five Eyes countries use each other's intelligence agencies to get around restrictions against spying on citizens, ala Chris Steele and Donald Trump.

K covered common attack surfaces, including lesser-known ones like "juice jacking" where when you plug in your phone to a public charging cable at a coffee shop or airport, criminals withdraw the data on your phone.  K gave specific countermeasures for that.

K offered up ways to secure your home router, ways to stay safe on public internet, and how to reduce the amount of "pattern of life" data you emit, enabling survielllance of yourself.  That backs up what NC Scout teaches when he talks about building a pattern of life on SIGINT targets.

The class covered more secure operating systems that you can boot from a USB drive to better protect your data and your browsing, to hide that pattern of life data.  It also covered basic and advanced methods of cryptology as well as some advanced steganography.  

Everyone in the class built their own Operating System flash drive and encrypted vault memory systems.  

The course covered a lot of great digital fieldcraft like how to hide or research metadata in files, how to trace emails, and how specifically internet traffic is routed, so that you can game that system.  Once you know how traffic is routed, how DNS servers work, and how MAC addresses work, you can then develop a strategy to work around the tracking protocols that are built into the system.

K gave his advice on good VPN services as well as which ones to avoid.

Some of the more in-the-weeds stuff was how to set up your browsers internal settings to maximize privacy and reduce tracking.  It's a lot of tech nerd stuff but absolutely vital as things progress here in the Western nations.

We went over various search engines and chat services, discussing merits of them.  For example, we learned that despite their public statements, Duck Duck Go isn't really private at all.  And, as I keep saying, K pointed out that Signal has no place in partisan activity.

K finally was able to break through my reluctance to using crypto.  He went over the blockchain entirely and expalined that most of it isn't as completely anonymous as they claim, but it is anonymous enough to make tracking hard.  He went over which coins were more secure and which were not safe.

There was much more in the class, including the tracking of your vehicle by the manufacturers and how to defeat license plate readers.

I highly recommend taking this class if it is offered anywhere near you.

GroundRod 2, which we have scheduled here at Camp Ponderosa for January 18-19, is a continuation of these topics.  You can register at CSG Calendar.

GroundRod 3 and 4 deal with the physical security skills of escape and evasion, kidnap resistance, and tradecraft.

Get trained and learn how to reduce your attack surfaces.

 

Read full Article
See More
Available on mobile and TV devices
google store google store app store app store
google store google store app tv store app tv store amazon store amazon store roku store roku store
Powered by Locals