Originally posted on The Special Operations Executive in Burma 1941-1945: Much has often made of the fractious relationship between the Secret Intelligence Service (SIS,) and the Special Operations Executive (SOE). The words used to sum up the problem between the two organisations is often something along the lines of SIS needed peace and quiet to… via…
Category: Intelligence Tradecraft
‘Golden Age of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping
‘Golden Age Of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping “Longstanding interest by US national security leaders has been heightened by Chinese advancements in quantum computing. For example, in 2017 China became the first country to demonstrate ‘quantum entanglement’ from a satellite to Earth. It could lead to much more secure communications…
Counterintelligence: A Few Resources
For many, the counter side of intelligence — or, the activities you use to prevent a given actor from gaining intelligence on you — barely receives a mention. There are plenty of resour… Source: Counterintelligence: A Few Resources
OSINT Resources
New Internet Search Resources (OSINT) When it comes to 4GW, Information and Intelligence are as much a weapon as a rifle. Learn how to use them to you advantage! Be sure and Bookmark these sites for future use. Stay Alert, Stay Armed and Stay Dangerous!
CO 101: Cybersecurity Pitfalls
Cybersecurity Experts: Stop Sending Troops Into Combat With Personal Tablets, Smartphones In the 21st Century, lessons like this are not just for the Military, but for the Civilian Operator as well. As long as we are dependent on tech, exploitation will always be there. Stay Alert, Stay Armed and Stay Dangerous!
CO 101: Battlefield Intelligence
BATTLEFIELD INTELLIGENCE: A PRIMER ON COLLECTION & EXPLOITATION Extremely valuable primer on collecting intel in the field. Stay Alert, Stay Armed and Stay Dangerous!
Civilian Operator 101: Open Source Intel
INTELLIGENCE RESOURCES YOU DON’T KNOW ABOUT Great list of open source intel sites. Stay Alert, Stay Armed and Stay Dangerous!
Espionage Files: How Putin Weaponized Wiki-Leaks
Evidence suggests that a Russian intelligence group was the source of the most recent Wikileaks intel dump, which was aimed to influence the U.S. election. Close your eyes and imagine that a hacking group backed by Russian President Vladimir Putin broke into the email system of a major U.S. political party. The group stole thousands…
Espionage Files: The Logic for (Shoddy) U.S. Covert Action In Syria
By most accounts, America’s efforts to covertly train and supply moderate rebels in Syria aren’t going so well. Apart from the obvious (Assad is still firmly entrenched in power and continuing to receive ever-growing external support),The New York Times recently reported that some arms provided by the Central Intelligence Agency (CIA) and Saudi Arabia haven’t…
OPSEC Tradecraft: Modern Clandestine Groups Face New Challenges
There were no mobile phones or recording devices allowed at this bizarre encounter. The digital era is perceived as posing new threats to the security of terror groups in Ireland in terms of their being tracked and covertly recorded. Source: The Guardian Bottom Line Up Front Compartmentation via unlinking Strict anti forensic practices to mitigate…