Many people are talking about the possibility of a civil war. Some people are acting as if one is going to happen. The intersection between those sets is almost zero.
Part 1: Some obstacles to caching
First, if you live in a state with licensing and registration, you’re screwed. Even if they don’t have all your weapons in their files, they know you have weapons. They can come and shake down your home and curtilage at their leisure. Registration and Licensing doesn’t solve crimes, and it certainly doesn’t prevent them. It is one thing only: a cheat sheet for confiscation. For that, it’s the cat’s pajamas.
We’ve heard a lot of bravado about boating accidents and long-ago sales to a tall short black guy with red hair and freckles. You can pull this off in one two-pronged case: no one else at all knows about your weapons and your plans, and you can resist intense interrogation. (Unless you have been trained in interrogation resistance in a resistance training lab, you probably can’t). This is completely without torture or threats to relatives, both of which will be available and in use in a civil war. Those two techniques can usually break even the trained resister.
Second, don’t rely on Oathkeepers bluster (another word beginning with “b” also fits). They mean what they say now, but things will be different then. Police will have no problem cracking down on you because (1) most cops will follow any plausibly legitimate authority; (2) human beings are born to rationalize; and (3) you’ll be demonized long before you’re raided. They won’t whack you, they’ll be whacking your indescribably monstrous straw man evil twin.
Every totalitarian state in history made liberal use of the ordinary cops for its political roundups, and no police element has ever mutinied or walked off the job when faced with that task. For example, the Gestapo and SS did not need to round up the Jews in occupied France: the ordinary French beat cops were glad to do it. None of them was ever punished; they transferred their loyalty seamlessly and unquestionably from the 3rd Republic to Vichy to the occupying power to the 4th Republic. Likewise, the Weimar cops became Nazi cops, who in turn became East or West German cops, and now unified Federal German cops. Hitler? Stalin? Who cares, we can retire at 45 with a good pension, and no one will miss a few Jews.
Third, don’t expect most people to back you. For every active resister, there are 20 dedicated, clandestine supporters. For every dedicated supporter there are 20 active and open collaborators. You active resisters will be outnumbered 400 to 1 by the Quislings. And even theywill be a minority. Most people will hunker down and try not to be involved. The side that pressures them will get their loyalty and compliance — as long as it outpressures its opponents, and as long as the pressure is applied.
Still wondering why civil wars get ugly, fast?
Fourth, if you’re fantasizing about this civil war, stop now. We’ve seen civil wars, and we’ve seen how a place can go from civilized to Hobbsean state of nature in jig time. The American Revolution has been sanitized in our history but even it, the cleanest and most civil of civil wars, was unbearably nasty. The victors wrote the history; the losers, the Tories or Loyalists, took ship. Or died. After losing everything. A new Civil War might look more like the last one, with new Mosbys, Booths, and certainly new Andersonvilles. Or it might resemble the Spanish Civil War, or the French Revolution. When Americans unhappy with government think of the French Revolution, they think of their opponents in the tumbrils. Remember the fate of Robespierre and the Jacobins was no different from that of the Girondins or the Bourbons. Remember that practically none of the Old Bolsheviks died of natural causes.
But if, after all that, you still want to be prepared for survival or resistance, read on. The lessons learned you are about to receive here are distilled from thirty-plus years in the practice of insurgency, UW, FID, and COIN, and a very great deal of study. They also incorporate the lessons learned from a sensitive — once, highly classified — strategic cache program that was meant to arm clandestine stay-behind forces and the resistance armies they would raise.
Part II: The Enemies of Cached Weapons
The enemies of your cached weapons, dear insurgent, are many. They are rust, and its valkyries water and air; construction and development; discovery; documentation; human frailty; and obsolescence.
Rust is a term for corrosion in ferrous metals. Essentially, iron plus air (especially damp, moist air) yields iron oxide, which is everything steel is not: weak, crumbly, almost worthless (well, you can make an incendiary mixture with it. But your guns are not the best feedstock for that; it’s not like rust is hard to come by).
You protect weapons from rust with permanent coatings like paint or parkerizing, temporary coatings like grease, vacuum-bagging them if you have the capability, and storing them in naturally or artificially dry places.
Even non-ferrous metals and supposedly “stainless” metals will corrode in the right conditions.
Water is principally a problem because of its propensity to accelerate rust. But it also has two other properties: it tends to wick into almost anywhere, and if it’s flowing, it can wear through anything. The Grand Canyon? That’s nothing but applied water and time.
Air is a problem because it contains all the ingredients for rust except the iron: water vapor and oxygen. It also can contain pollutants that accelerate corrosion.
Development is a threat to a surprising number of caches. Europeans periodically wake up to a news story of a cache of weapons or other stuff from the Cold War or World War II. The Nazis cached hundreds of tons of arms for a Werwolf resistance that fizzled out, partly because the Nazi state’s defeat made its ideology much less compelling, and partly because all four Allies had no compunction at all about shooting Werwolf suspects, even children. These unused caches get unearthed in Germany, Austria and the Czech Republic by urban and rural development all the time. They’re usually old, forgotten, neglected caches in bad shape.
Apart from concealment, which was often good, the Werwolf caches were a pretty good example of how not to conduct a strategic cache program.
While some hazards are easy to defend against — you can “set ’em and forget ’em” — defense against development requires long-term curation. If a cache is implanted, someone must monitor it, and when development encroaches, move it. Therefore, the caches that are discovered are the ones that are haphazardly monitored or that were implanted by defunct organizations that never took up, or failed at, monitoring.
It is also helpful to emplace caches in locations that are away from either axes of likely future development, potential high value positions or targets in civil or general war (such as key terrain), or potential bivouac locations of hostile forces.
Discovery is the accidental location, exposure, or penetration of the cache, not as a result of counterguerrilla or counterespionage activity, nor as a result of development-related excavation. Your likely discoverers are hunters, hikers, and, especially, kids.
Guard against it by placing the cache on difficult terrain, and concealing the cache well.
Documentation is a double-aged sword. It allows for the recovery or relocation of caches even if no responsible individual is available (a real risk in UW). It is useful in the demobilization phase after victory has been achieved; or in an underground or dormant phase after a major defeat. But it also allows hostile forces to find and recover caches, or even worse, surveil them and roll up networks.
To counter these risks, documentation should be kept to a minimum and safeguarded, possibly with such measures as clandestine writing and encryption. Cache reports should never be transmitted by or filed on computers or electronic devices. (Assume all computers are bugged).
Human Frailty (memory and weakness) is what happens to most caches — not to put too fine a point on it, somebody rats them out.
The way to combat this is to enact strict positive vetting, need-to-know, and compartmentalization. No one should even know that there are caches unless the person’s trustworthiness has been established beyond doubt. No one should know any more about caches than he or she needs to, and that information must be given to the smallest practical number of people. And finally, no one should know about caches not relevant to his cell, mission, or location.
Obsolescence is the final problem with caches. If, mirabile dictu, things are so well packed and preserved that they’re not at risk, the canny old wizard we call Time still has one ace up his sleeve: obsolescence. You don’t know where it’s coming from; small arms development proceeds by a pattern of punctuated equilibrium. You can’t tell when technology will overthrow your stored ordnance. Rebels who buried their guns in 1800, or in 1900, would still be armed like a national army forty years later, but if they buried their guns in 1840 or 1940, they would dig up a bunch of very outdated hardware in 1880 or 1980. (We were, in fact, digging up — for inspection — caches planted in the 1940s periodically through the 1980s). But small arms performance plateaued enough in the 20th Century that the guns are the least of your worries. A guerrilla band armed today with Garands and MP.40s would still have considerable lethality, but there’s no hope for the crystal and tube radios of the 1940s for practical field communications. Likewise, medical equipment stored even a decade ago has been replaced in the real world by improved devices and products of new research.
There is no easy way to combat obsolescence. You have to be prepared to service the cache as we did during the cold war, a difficult and expensive undertaking fraught with risk to the servicer, the cache, and the security of the program.
To be continued in Part III: Types of Caches and IV: Cache Best Practices
We will learn that, as useful as it may be to consider the risks above, you’re going to find that if you want to use the cache or caches, you’re going to have to accept considerable risks beyond those. Indeed, the use of the cache is ever in tension with the security of same (a tradeoff with many, many parallels in the insurgent’s world).
And anything you can do can get you scarfed up. No pressure, though.
Look for Parts III and IV next week.
I post the follow up as soon as I’m able.
American by BIRTH, Infidel by CHOICE