BATTLEFIELD INTELLIGENCE: A PRIMER ON COLLECTION & EXPLOITATION Extremely valuable primer on collecting intel in the field. Stay Alert, Stay Armed and Stay Dangerous!
Category: Counterintelligence
Why So Many Western Covert Operations Have Failed Since World War II
Shots in the Dark – Why So Many Western Covert Operations Have Failed Since WW2 A Great read both from a historical point of view and practical, Civilian Operator POV on the RELEVANCE of Guerilla Warfare in the 21st Century. You have to Understand the Lessons of History in order not to repeat the…
Dose of Truth: The “Future” of War is Now
If any of you have ever read the book Ghost Fleet by P.W. Singer you would realize with a chill down your spine that more and more things listed in that fictional work regarding Military Technology is beginning to unfold right before our eyes. The recent unveiling of China’s new Dark Sword Drone makes the…
Civilian Operator 101: Open Source Intel
INTELLIGENCE RESOURCES YOU DON’T KNOW ABOUT Great list of open source intel sites. Stay Alert, Stay Armed and Stay Dangerous!
Surveillance State: Baltimore’s Extensive Aerial/Ground Surveillance Program
(Click on above image to be re-directed to source page) Baltimore is definitely not the first American city to be enveloped in a “cocoon” of real-time surveillance, but it is the first to have such an intensive and EXPENSIVE system go online and not be announced publicly due to “private donor” funding. If Federal tax…
Crusader Corner: Entire Church on ISIS Kill List – Names Taken From Online Church Directories
Entire church in U.S. on ISIS kill lists (click link above to be re-directed to original page) Christian church security is nothing new in the age of islamic terrorism, many mid to large capacity churches have either hired armed security or encouraged their parishioners to form their own security details during services. This current threat…
Espionage Files: Brit Spies Used URL Shortener to Honeypot Arab Spring Dissidents
A shadowy unit of the British intelligence agency GCHQ tried to influence online activists during the 2009 Iranian presidential election protests and the 2011 democratic uprisings largely known as the Arab Spring, as new evidence gathered from documents leaked by Edward Snowden shows. The GCHQ’s special unit, known as the Joint Threat Research Intelligence Group…
Examining Terrorist Tactics: The Jihadist Comms Toolkit
A new report documents how extremist groups’ use of secure digital tools software has evolved. “I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use…
Espionage Files: How Putin Weaponized Wiki-Leaks
Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election. Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands…
OPSEC Tradecraft: Modern Clandestine Groups Face New Challenges
There were no mobile phones or recording devices allowed at this bizarre encounter. The digital era is perceived as posing new threats to the security of terror groups in Ireland in terms of their being tracked and covertly recorded. Source: The Guardian Bottom Line Up Front Compartmentation via unlinking Strict anti forensic practices to mitigate…