OACOK* For Home Defense Terrain Analysis Refresh your brain on OAKOC. Highly recommend you have a flash drive for such material and keep it in your Go-Bag
Category: Military Intelligence History
Why the Average Civilian Should Study Asymmetrical Warfare
From the Archives, 2015. I got asked this question the other day by a close friend and it occurred to me that I had never really plainly answered that question on this blog, even though I talk about the subject frequently. I think the best way to approach this subject is through historical precedent. It…
SOE / SIS Cooperation
Originally posted on The Special Operations Executive in Burma 1941-1945: Much has often made of the fractious relationship between the Secret Intelligence Service (SIS,) and the Special Operations Executive (SOE). The words used to sum up the problem between the two organisations is often something along the lines of SIS needed peace and quiet to… via…
Columbia Hostage Rescue: A Vignette On Personnel Recovery
Sent in by a reader, this is the full version of the clip referenced in the Jungle Crash post. Its an important watch for a number of reasons, but chief among them is the critical role of personnel recovery: Students in class have heard me emphasize in every course the importance of personnel recovery- as… via…
‘Golden Age of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping
‘Golden Age Of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping “Longstanding interest by US national security leaders has been heightened by Chinese advancements in quantum computing. For example, in 2017 China became the first country to demonstrate ‘quantum entanglement’ from a satellite to Earth. It could lead to much more secure communications…
Subversion 101
Thanks to Viking Life Blog for posting this excellent video. It is imperative for the Martial Citizen to understand the tenets of Fourth Generation Warfare (4GW) if he is to survive in the 21st century. “The Highest Arc of Warfare is not to fight at all, but to subvert anything of value.” Compare what is…
CO 101: Cybersecurity Pitfalls
Cybersecurity Experts: Stop Sending Troops Into Combat With Personal Tablets, Smartphones In the 21st Century, lessons like this are not just for the Military, but for the Civilian Operator as well. As long as we are dependent on tech, exploitation will always be there. Stay Alert, Stay Armed and Stay Dangerous!
Espionage Files: The CIA and A Turkish Coup
THE CIA AND A TURKISH COUP (click on link above to be re-directed to source page) All you fellow Intel Historians will enjoy this article. Stay Alert, Stay Armed and Stay Dangerous!
World War Two Era Weapons: Clandestine Weapons of the OSS
Clandestine weapons so clandestine, they never were. Thanks OSS! (click on above link to be re-directed to source page) A really interesting read with some awesome links to other articles. Stay Alert, Stay Armed and Stay Dangerous!
Military History: Operation Paul Bunyan – August 1976
Operation Paul Bunyan – August 1976 (click above link to be re-directed to Source Page) An Obscure piece of Military history that is both entertaining and enlightening as to how friggin crazy the North Korean’s really are. Stay Alert, Stay Armed and Stay Dangerous!