Over the course of my career, I've noticed a trend in many fields of study: Novices, hangers-on, dabblers, and other folks tend to buy mid-to-high-end gear, thinking they'll "grow into it", but in reality, secretly hoping the gear will do the work for them.
Whereas the truly skilled are often the folks with lower-end equipment, but who can do some absolutely amazing stuff with it.
I've seen it in cyber. I've seen it in photography. I've seen it in woodworking. I've seen it in firearms. I've seen it in vehicles. And on, and on.
Of course, there are opposites in each camp: Novices with low-end gear, and experts and wizards with high-end gear.
The difference is that the wizards with the high-end gear can also make garbage sing. And the novices with the trash-tier gear are hopefully going to run it until they've exhausted its capabilities and truly outgrown it before graduating to something better.
The gear doesn't make you good. You make you good, through training and practice. When you see someone amazing doing amazing things with really expensive stuff, it's usually because it either addresses an extremely specific need they have, and/or because it makes something they can do with other, lesser gear easier, and they could afford the upgrade for the convenience.
People often mistake this demonstration of ability for a property of the gear, rather than the operator.
Don't be that person.
You want to take photos? Buy an inexpensive camera in whatever format you prefer, and get to work. Learn everything you can. Exhaust the possibilities your equipment offers you. By then, you'll have enough skill and knowledge to know what to buy next. Or, you may realize that you're quite happy with what you've got, and continue to develop your skill and technique with it.
The same is true in just about any endeavor. It's not about the gear. It's all about you. Gear isn't a short cut. It's arguable that being bad and buying higher-end gear may actually hinder rather than help you, because you don't know what you don't know, or what you're not capable of.
Plus, I've found that working with lower-end gear builds a repertoire of approaches to problems you just don't get when you use an easy button to get there. You learn different ways to solve the same problem, making you more flexible and resilient.
Radio comms are a great example: Anyone can spend money on an antenna. But can you build one? Do you know how? Did you know that a field-expedient antenna may actually outperform all but the most expensive commercial antennas you can buy?
Don't rely on high-tech, high-dollar solutions to your gaps in skill and knowledge. If you have a burning need to spend money, spend it on training. The more you learn, the more you develop your skills, the more you'll understand how to get the most out of what you have, what its limitations may be, and where, when, and with what you may want to supplement by buying additional or more capable equipment.
My primary AR is a good example. I've had this thing for almost a couple of decades. It was my first AR, and I built it myself. The upper, lower, and barrel were a matched set I bought from a small gunsmith way back when. Since then, I've changed the handguard, the trigger, the BCG, removed the A2 front sight, and swapped out various furniture and optics over time. But the core rifle, including the barrel, is still the same old budget build I started with (though I should probably start considering a barrel replacement, now that I mention it). I didn't buy a KAC, or a DD out of the gate. I bought what I could afford (I didn't know about PSA at the time), and I wanted the experience of building my own. Any gunsmithing done on it has been my doing.
I've yet to outgrow or outshoot it. It's served me well. The rollmark doesn't matter. What matters is that I'm proficient with it, it does the job, it holds up, and I've yet to need anything "better". I've rung steel out to 400m with it, consistently, and have hit out to 600 in the past. I know what it likes to eat, and how it behaves in various conditions. I know when it needs to be wet, and when it can run drier than usual. I know how long I can go before a cleaning is more than just a weekend meditation for me, but a necessity for the rifle.
I do some fairly high-end cyber work. I do it on a run-of-the-mill Dell laptop. Whenever I need significantly more horsepower, I farm it out to on-demand cloud instances. I didn't feel the need to buy a top-end laptop, or have a massive desktop tower with multiple high-dollar GPUs. And I've been doing this for 40 years now. Because I know it's a tool, and all the talent and knowledge resides in me, not it.
I've done the same with motorcycles. I once tracked a sport-touring bike at Thunderhill raceway. When everyone else was on R6s or R1s, or 'busas, etc. Did I scuff my knee pucks? No, but that has more to do with my riding position, the bike geometry, and center of gravity for that bike/rider combo than it does my skill as a rider. There were no chicken strips on those tires when I was done. I maxed out the engine in the straights, and was taking turns around 90-100mph. I didn't ever feel the need to get a pure sports bike, because I don't like the riding position, and tend to enjoy a more conservative ride. Not because I'm not capable, but because that's how I prefer to ride.
A journey of knowledge is a journey of self-discovery. As you learn more about a topic, you also learn more about yourself. Particularly as you practice. Both are equally important. Arguably, the self-knowledge is more important, because it guides your continued learning, growth, and development.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
I was shocked when our daughter entered fifth grade and we discovered:
1) They didn't use textbooks, just printouts and computers/tablets 2) All tests were "open-book", with as many retakes as they wanted. 3) All lessons were "Common Core". She had no idea how to do basic math, etc. I taught her how to properly do multiplication and division, long-form, by hand on paper.
We started homeschooling her shortly thereafter.
Public schools have become nothing more than factories for ginning/rigging high student grades to obtain high federal funding to pay for a bloated bureaucracy within the school system.
One of the schools she would have attended in the area we lived at that time boasted about being "one of the best schools in the state".
They used these and other methods to artificially inflate their student grades, and spent the entire year teaching to the state/federally-mandated "No Child Left Behind" testing, so those test scores were high enough to fund the things the school wanted, like a heated, indoor Olympic swimming pool, a "media lounge", and other bougie BS that has nothing to do with academics.
In short, the school rigged results to create a showcase luxury building for the administrators, teachers, and parents, so they could all feel better about themselves, while matriculating students who can't read, write, or minimally function in society.
And this school was by no means an exception. It's the norm.
We fought tooth and nail against local ballot measures to increase property taxes through bonds for the school, to the tune of over $20 million, to build multi-million-dollar football stadiums for middle schools, multi-hundred-thousand-dollar concession stands (which were literally just a 15x10 shack on a slab, with basic electrical and no facilities), and millions of dollars on improved, "more secure" doors on school buildings. We even countered with a proposal for actual, proven security measures against school shootings (their fear), and pointed out the most secure doors in the world are pointless if people leave them unlocked or prop them open, which has been the case in multiple school shootings.
We were publicly attacked, by name, by school board members.
Our property taxes doubled when the measures passed.
We live in an area with some of the worst schools not only in the state, but the country. But we routinely pass billboards touting the tens of "award-winning" "Magnet" schools in the district, and a luxury administration building for the school board, which is so big it contains a public library, a small mall, and substantial meeting/conference space which they desperately try to rent out for parties and weddings/receptions.
When our daughter entered college (and my wife, to finish her degree), we learned that colleges now have entrance exams supposedly for placement into college math and English classes, in addition to the SAT and ACT.
In reality, they're to justify shoving new students into remedial classes to get them up to a bare minimum for the vastly dumbed-down college English and math classes, which many students STILL fail, even though colleges now also allow open-book tests with multiple retakes.
Short-ish (15m) video on using the TinySA Ultra to work up an RF baseline for your immediate area, and how to use it to detect nearby drones.
Shoutout to @brushbeater near the end, and his new dedicated drone detection device, for sale at . brushbeater.store
Apologies for 1) my voice, 2) the occasional truck drive-by, and 3) the brief segment of the drone flying. I've caught a slight bug, so my voice is a little weird now. This road is usually zero traffic, so I wasn't expecting the interruptions. And the 20 or so seconds of drone flight totally drowned out what I was saying. However, you didn't miss anything; I was just filling the awkward pause until I landed it, and pointing out there's no real change in the plot between it sitting on the ground and flying.
Also, let me know if you like this. I did zero editing, and it was a single take. If you think it's useful, I'll try to do more things like this in the future. I'm considering a DF (direction-finding)/foxhunt demo for the next one, to show people how to locate a transmitter, using either a loop antenna or a Yagi (and how DFing is different using the two different antennas).
On this, the anniversary of January 6th, I'd like to remind you that you are constantly surveilled. If you intend to participate in any activity in the future that may one day (even years later) be determined to be something someone in power didn't approve of, be conscious of:
* Private surveillance, which law enforcement (LE) may also access, either in real-time, or after the fact, with or without the surveillance owner's knowledge or permission. This includes things like doorbell cameras (e.g., Ring), home security cameras, security cameras in parking lots, stores, security cameras built into ATMs, cameras on electric vehicle charging stations, cameras in vehicles themselves (both externally-facing and internal, either built into the vehicle, or as an aftermarket add-on), and so on. Also, be aware that most of these also have decent microphones.
* Public surveillance, such as Police Observation Devices (PODs), traffic cameras, tollbooth cameras, etc.
* All purchases you make with anything other than cash are electronically recorded and stored, including date, time, location, and items purchased.
* All cash withdrawals you make are electronically recorded and stored, including date, time, location, and amounts, and can be correlated by intelligence analysts to other activities.
* All vehicle movement is tracked, either directly via the telematics unit in the vehicle (and possibly also by your smartphone), or indirectly via license plate readers, traffic cameras, AI-assisted surveillance devices like Flock cameras that are now in widespread use by LE, satellite surveillance, etc.
* Any interactions between you and any other entity in which personal information is exchanged is electronically recorded and stored.
* All movements of any cellphone, smart or otherwise, "burner" or not, are tracked. "Off" doesn't do what you think it does, and a Faraday bag is not protection against this. If you must participate in such activities, take absolutely no electronic devices with you. No "smart" watch, no "smart" ring, no phone, "smart" or otherwise, no "burners", nothing. You should emit zero RF energy.
* There is no such thing as a "burner". You do not possess the tradecraft necessary to successfully use a secondary device safely and in a privacy-preserving manner, and you WILL get caught. I don't care what your "but" is about to be: no.
* Always rely on foot travel whenever possible. Keep as close to trees or the sides of buildings as possible. Wear a hat with a brim that covers your face. Wear a hood. Wear a mask (thanks to COVID, it's now normalized). Put several uncomfortable pebbles in one shoe. Cover all visible skin to the greatest extent possible. Always try to look slightly down, never up.
* When foot travel is impossible, bicycles should be preferred. When these are unfeasible, rely on public transit to the greatest extent possible (note to millennials: this means busses and taxis and trains and other things paid for in cash, not Uber or Lyft or other ride-sharing services).
* Never initiate secondary activities (acquiring a hotel room, entering the primary area, etc.) close to the time of the primary activity. Your goal is to decouple to the greatest extent possible any activity you participate in with the one in question, both in time and, where possible, space.
* "Decoys" won't work. Again, you don't have the tradecraft necessary to make them effective. So giving someone else your phone, debit card, etc. isn't going to fool anyone.
* Establish patterns of life well (months, years) in advance that make the above activities not stick out like a sore thumb.
Forgot to add the tire pressure sensors in your wheels are also, increasingly, tracked.
All internet activity is electronically recorded and stored. This includes all searches (yes, even using those search engines that are supposedly "private", yes, even using "incognito mode" or "private browsing mode").
This includes all network traffic, including activity on TOR, IPFS, and other supposed "alternative, secure, secret, private" networks.
This includes -- well, let's just say that if you're using an electronic device of any kind to do it, it's being recorded and stored and can be accessed by LE.
Yes, even when you thought you were being sneaky and using a kiosk computer, or that demo unit in the store, or the one down to the library, or your buddy's machine. Yes, it's readily identifiable as your activity, not theirs.
As of right now, there's no specific information on exactly what make and model of pagers were involved, or if they were pagers at all. They could have been one of those SIM-based radios or similar.
However, all signs point to this being a malware-based remote attack by Israeli intelligence at this time.
So, how could someone pull something like this off?
The obvious conclusion many will jump to is that someone intercepted the devices and planted small explosive charges in them.
While this is the low-hanging fruit, it's also the least logistically feasible. Plus, it's unnecessary.
Most electronic devices these days come from the factory full of explosives, in the form of capacitors and lithium-ion batteries.
Fun fact about Li-Ion batteries: expose the contents to air, and you get what chemists call an energetic reaction, and what your average person calls an explosion.
How would someone do that remotely, to multiple devices simultaneously, using malware? Easy.
As I mentioned, modern electronics are full of capacitors. Capacitors store charge. Most are tiny these days, as they're SMT (surface-mount technology); smaller than a grain of rice in many instances. Some, however, are the older barrel-style capacitors. This is because the size of SMT capacitors limits their capacity. Sometimes, you need something bigger. to help power the mechanical motor inside a pager or phone, for example, that provides the vibration. Many people don't realize that vibrating devices do so by simply rapidly spinning a lopsided weight attached to a small motor inside the device.
All of the circuitry in a modern electronic device, save for things like the very initial stages of external power input, are mediated and controlled by computer chips. Computer chips, in turn, can have their behavior modified via software.
So, all it'd take would be for some smart person to figure out a way to override the existing safeguards that prevent overvoltage or overcurrent conditions on certain parts of the circuit board via malware. With those safeguards removed, one or more capacitors may receive too much charge too quickly, and when that happens, they tend to very quickly burn out. So quickly, it's like a small "pop".
Do that to a capacitor or several near enough to a Li-Ion battery, and you rupture the (flimsy, thin) packaging protecting it. Once that's ruptured, the battery explodes violently.
Given how densely packed the circuitry and components are in modern electronic devices, the likelihood of a capacitor or several being extremely close to, if not in contact with, the battery is quite high.
All the smart person would need is knowledge of the make/model of device carried by many Hezbollah operatives, and time. Time to disassemble and examine the internals of the device. Time to reverse engineer the firmware to find a vulnerability (relatively easy, and there are automated tools to do all this), and time to determine the most effective means of delivery, preferably without the target's knowledge or interaction (multiple mechanisms for this exist, even with smartphones).
Then, they detonate the devices at the time of their choosing.
Yesterday, when I mentioned that Starlink would be of limited use in a true emergency situation in which there may be infrastructural issues with parts of the internet, many people demonstrated they don't quite understand how the internet works.
So, this morning, we're going to dive into that a bit. Buckle up. A 🧵.
First, your primary interaction with the internet is likely through phone apps or web browsers. To you, it's simple as can be: you launch the app, or type in a domain in the address bar of your browser (or, if you're like most people, just use a search engine and click on the first link that looks reasonable), and you're taken to the content and/or functionality you want.
It's nowhere near that simple. And I'm going to try to avoid analogies so people don't get confused, while also trying to be as detailed as possible but still keeping it simple for the layperson.
To begin, you need to understand how you get to what you want on the internet. And that begins with addressing. Everything connected to the internet has an address. In fact, they have multiple addresses, but we'll get to that in a bit. For now, I'm discussing Internet Protocol, or IP, addresses.
You generally don't interact with or even see these. They look like a dotted quad: 192.168.37.42, for example.
What you generally see and interact with are domain names. Fully-qualified domain names, to be specific. A domain name looks like: .
In , there are actually 3 domains, and a subdomain:
www: subdomain
: second level domain
com: top level domain
.: root domain
You're probably wondering where that final period (".") came from that I labeled "root domain". It's implied at the end of every domain, after the top level domain.
Every domain name registered on the internet is purchased through either a registrar, or an agent acting on behalf of a registrar. A registrar is a company that has permission to sell entries in a database held by a registry.
Registries are companies given authority over the data for top level domains.
So, for example, there is a registry for .com. That registry company sells the rights to create entries in the .com database to various registrars, who in turn sell domain names to the public.
When someone buys a domain name, they give their money to a registrar, and that registrar puts the domain name in the top level domain's registry database.
So, let's say I buy . I pay my money, and my personal details (or those of a privacy agent I pay to mask my personal details) are entered into the registry database for .com, stating that I own that domain. Along with that are some unique identifiers, an expiry date for the domain, and two or more domain names or IP addresses for authoritative nameservers.
The authoritative nameservers become very important in a minute. They are the location of the database that contains all the data for the subdomains of . So, for example, it'll contain the IP address for , if I put it in there. And I have to, because since I own , I'm responsible for managing the addressing for anything under it.
The root domain servers know the IP addresses for all the registries for all the top level domains in the world.
So! When you type in into your web browser, or a phone app tries to access , your computer starts a whole series of questions going out into the internet, trying to find out the IP address for .
This is generally done using a caching recursive resolver (we're going to skip over things like stub resolvers for the purpose of this thread). A caching recursive resolver is the closest most of you will come to interacting with DNS infrastructure. Many people use popular ones like 8.8.8.8, or 1.1.1.1. Other people are content to use the ones assigned to them and run by their ISP.
So, when you try to connect to , your computer reaches out to whichever caching recursive resolvers your computer knows about, and says, "Hey! What's the IP address for ?"
They will either know the answer because they've already done the research and have saved ("cached") the answer, and it'll answer immediately, telling your computer the IP address, or it'll begin the process of recursive resolution.
In recursive resolution, the caching recursive resolver looks up the IP address for one of the root DNS servers, which is stored locally on the caching recursive resolver as part of the configuration process in what's called a "root hints" file, and goes and asks the root server "Hey! What's the IP address for ?"
The root server doesn't know. Because that's not its job. Its job is to know the IP addresses of the top level domain registry databases. So the root server responds, "Beats me. Go ask Bob. Bob's responsible for .com." and gives the caching recursive resolver the IP address for the .com registry.
The caching recursive resolver goes and asks the .com registry, "Hey, what's the IP address for ?" And it responds, "Who knows? Go ask Bill; he's responsible for !" and gives it the names for the authoritative nameservers I put in when I registered .
Now the caching recursive resolver has to start another entire process of recursion to look up the IP addresses for the names I put in as the authoritative nameservers for . Once the caching recursive resolver has those IP addresses, it goes to whichever one it wants (not really, but we're not addressing nameserver priorities, round-robining, and such here) and says, "Everyone tells me you're responsible for . What's the IP address for ?"
And, all else being equal (there are multiple further wrinkles I'm avoiding to keep this simple), your caching recursive resolver is told the IP address for .
It then caches that response, which it'll keep until the TTL (time to live) value assigned to the answer expires (it won't, but that's an entirely other story and has to do with a whole lot of politics, comp sci, and DNS inside baseball; I used to work for the guy who invented DNS, so I got to see the sausage get made routinely), and it gives your computer the IP address for .
That's before your computer or phone has sent a single bit of data to .
As you can see, there's a whole lot that can go wrong just in this process alone. If any point along any of this fails, or provides incorrect information, you can't reach .
And there are myriad ways in which any of that I just described could fail. We'll be discussing some of those further along.
One spectacular way it can fail is human stupidity. Back in 2016, a journalist named Brian Krebs was investigating some criminals pulling scams on unsuspecting businesses, selling them DDoS protection while the criminals were the ones perpetrating the DDoS attacks.
He embarassed them pretty good. In response, the criminals executed what was then the world's largest DDoS attack against his website.
His website was hosted by a company called Akamai. Akamai's a big deal in the internet world. They're responsible for a whole lot of stuff. One of the things they provide is DNS hosting -- that is, providing authoritative DNS services for individuals and companies. Like I described up above, when I bought . I said I was responsible for managing the data for . I'm also responsible for making that data available to the internet. I could run my own authoritative nameserver, but common practice these days is to pay someone else.
Akamai is one of those someone elses. And tons of people pay them for exactly this. Very large companies, like microsoft, and amazon, and zoom, and a bunch of other companies you'd instantly recognize.
When those criminals launched that massive DDoS, it revealed to the world how dumb most network folks are these days: they ignored . IANA is the organization responsible for all the rules and standards regarding how the internet works. There have always been requirements for how DNS should be run. The ones we're concerned with here are that there should always be at least two authoritative nameservers, they should not be the same, and they should not be run by the same company, on the same infrastructure, in the same geographic or logical area.
That last one totally f*cked the entire East Coast of the US, and thus, much of the world, that day. Because everyone and their dog decided they'd just make all their authoritative nameservers be Akamai servers.
So, when Akamai got attacked, none of those authoritative nameservers could be reached.
And these days, the TTL for most names is 0 or very close to it. Which means answers for name queries only get cached for a few seconds.
Which, in turn, means recursive resolvers are constantly having to recurse to get the latest IP for a name. Which means they have to be able to talk to the authoritative nameservers responsible for the names they need IPs for.
That day, no one could, because everyone ignored IANA.
And they still do. To this very day. Not a single lesson was learned. Everyone just makes both their authoritative nameservers different names within the same company, usually within the same network, in the same geographic region.
A handful of p*ssed off script kiddies took Amazon and many other of the largest internet companies offline that day, and weren't even trying to.
So, when I say the internet is fragile and there are tons of ways you can effectively take it down, this is but one example of what I meant.
And all I've covered so far is how to get an IP address for a domain name. We haven't even gotten to the good stuff yet.
I've also avoided topics like DNS cache poisoning, NXDOMAIN redirection, typosquatting, domain sniping, bitsquatting, and other ways to manipulate DNS results, because I'm -- you'll chuckle at this point -- trying to keep it simple.
I just noticed that, when I said "fully-qualified domain name", I gave an example that X decided to turn into a URL, and shorten a bit.
I actually typed in the correct thing: www[.]example[.]com (the brackets are to prevent X from doing it again), but in the text, it made it look like .
So, when you read that bit, please mentally put the "www" in front of for that one statement.example.com example.com
First, some background on me: I've been lifting heavy for more than 20 years, though I stopped around 2015, due to a serious injury on the platform at a national competition. It wasn't my first such injury; in 2013, I snapped my right forearm in half on the upstroke of my first attempt at benching 385 in training. That won me a plate, five pins, and a screw in that arm, and a year-plus of agonizing pain, trying to work through what turned out to be tendon adhesions to the interosseous membrane (thank you, Kelly Starrett, for taking the time to see me at your gym and help me figure out what multiple medical specialists and therapists couldn't).
I used to be a competitive powerlifter, and nationally ranked. In 2015, I went to New Jersey to compete in a national competition. For that meet, I was lighter than I've ever been: I weighed in at 220, having cut from the mid 240s in a week's time (yes, it's possible, by severely manipulating your body's water retention and sodium content). Rehydrating and replacing electrolytes immediately after weigh in, I was back to mid 230s within an hour. After eating, I was back to around 240.
That's pretty normal for competitors, particularly at that level.
Anyway, I was also competing raw, after years of geared lifting ("gear", in this context, is bench shirts and squat and deadlift suits). In this particular league, "raw" meant not even using wrist or knee wraps. Completely raw. Also a novelty for me.
For those unfamiliar with powerlifting, it's an individual event, where competitors each do three squats, followed by three bench attempts, followed by three deadlifts, with each competitor rotating through one lift before doing their next.
On my third squat, I told the spotters to take the weight, as I felt something off and very painful in my lower back. I found out later I'd herniated both L4 and L5. At the time, I thought I'd just pulled a muscle.
I got assisted off the platform, went to the back of the room, and lay on the floor, while I had my wife get my horse liniment, DMSO, and capsaicin, and I applied all liberally to my lower back. Then, I tried to roll it (I don't use a foam roller; I use a 6" diameter PVC pipe; I find it more effective). The liniments and such helped with the pain enough that I could gingerly roll the area, and I was well enough to get through my bench warmups, though I only took 3 different weights.
I completed my benches successfully, but by that time, because you keep a tight arch when doing a powerlift bench, my back was even worse.
By the time it was time for deadlifts, I didn't even warm up. I told the scoring table and judges I was going to just take one, light, token deadlift at around 550lbs (I was going to go for a personal best around 740 at that meet; it wasn't to be).
I spent the next two to three years rehabbing my back, and not lifting at all. I refused to get back surgery, because everyone I talked to that'd had surgery for their hernias felt they were worse off after than without the surgery. So, lots and lots of chiropractic work, infrared light therapy, warm castor oil compresses, and stretching, not to mention my wife's infinite patience, and I was more or less healed.
But I hadn't lifted since.
The point is, I've been lifting for quite a while. I regularly walked around around 260lbs with either six-pack or eight-pack abs.
But I hadn't lifted since that day in 2015 that ended my competitive lifting career.
Fast forward to last year (2023), when I attended @Brushbeater's Scout course. It was originally supposed to be both Scout and Recce, but by the last day of Scout, I was out of gas. On the last exercise of the course, our squads decided to assault full-speed up the most grueling hill on his property.
I didn't make it. I got 2/3rds of the way up the hill, and was sucking wind so much I had to stop, and the medics came over to tend to me. I had a (for me) shameful ride in the SxS back to the team room.
I am not a spring chicken. However, I am also not dead yet. I'm in my late 50s. Having spent a decade in peak physical form (for me), that hill kicked me in the nuts and brought me to reality in a way nothing else could.
I was no longer in shape enough to protect myself or my family. I sat, tears in my eyes, telling @VA_minuteman that I cannot let my daughter have to deal with what I worry is coming without me.
You have to understand something about me: I do NOT quit. I do not give up. I consider any such action a VERY personal failure, and I consider it utterly unacceptable.
People generally fall into two camps: those who will accept defeat, and those who absolutely refuse to.
I'm one of the latter.
So, though I had been doing weighted rucks and some gym workouts for several months to get ready for those courses, I realized I was lying to myself.
Right then and there, sitting quietly in the team room by myself, listening to the radio chatter and waiting for the rest of my team to successfully complete the course, I vowed to myself I would not let that F'ing hill beat me.
So I went back to the gym, determined to get back in shape.
That's what I've been doing for the past year.
And here, I'll give you some hard-won wisdom and knowledge from my journey, both over the past year, and since I decided to start lifting decades ago.