Articles written by: Samuel Culper III

Connecticut BICC/E

Connecticut BICC/E

Over at Forward Observer Dispatch, I’m going to lead a project that examines the ground situation and develops potential Regime courses of action (COA) in Connecticut.  If you’re interested, I’d love to have you join.  We’ll be starting a new project each month.  Right now, we’re working through an Area […]

read more

Principles of Clandestine Communications

Principles of Clandestine Communications

-By-Steven Barry Face-to-face meetings, conducted secretly between operational personnel, are known as clandestine meetings. Such meetings are employed frequently in the field; chiefly with regard to management and administrative func­tions.In general, the advantages of clandestine meetings are 1) they save time, 2) they are used as a countermeasure against some […]

read more

Online Courseware

Online Courseware

Catfishbrody gets some major props for telling me about Coursera. In addition to developing some online courseware for Forward Observer Dispatch, I’m going to enroll in a few free online course via Coursera.  This is just one of many websites that features online courses from Yale, MIT, Stanford, and other […]

read more

The Case for OSINT

The Case for OSINT

Open Source Intelligence (OSINT) information makes up 80-90% of all intelligence information because there are so many sources and collectors.  Every website, news report, magazine article, and speech produces OSINT information.  Every Patriot is a sensor, so it’s incumbent on us to utilize all these collectors of intelligence information because […]

read more

Community Security Checklist

Community Security Checklist

A friend suggested that I write an article about the things I’d do to prepare my community.  All talk of “action” aside, there are a handful of tasks that each of us should be doing in order to prepare to protect our communities and ourselves.  I’ve prepared a JPEG (download […]

read more

Countermeasure: Information Is About Control

Countermeasure: Information Is About Control

This is a very good article about Oakland, California’s Domain Awareness Center (DAC).  In classes we often talk about Information Dominance; we try to get the edge on our adversaries, and our adversaries on us.  Information Dominance means owning the information domain, and is much easier to gain with multimillion […]

read more

Syria: Beseiged Areas

Syria: Beseiged Areas

I haven’t kept up to date with Syria.  So many places, so little time.  But I did come across this website, and it shows some excellent examples of how we delineate Areas of Operation (AO), Operation Boxes (OpBox), or as this map shows, besieged areas or occupied/held territory. (Read the […]

read more

Rural Defense Units and What Popular Opinion Tells Us

Rural Defense Units and What Popular Opinion Tells Us

I keep reading about these ‘Rural Defense Units’ in Mexico, which are forming to protect their communities from drug cartels.  Last month, the Mexican Government passed a law authorizing the Rural Defense Units, essentially the unorganized militia numbering up to 20,000 strong, to participate alongside federal forces in rooting out […]

read more

First Look: NSA Role In US Assassination Program

First Look: NSA Role In US Assassination Program

* UPDATE: As of 0956, I started getting 503 errors on First Look / The Intercept.  My bet is on a DoS. * Pierre Omidyar (billionaire of eBay fame) and Glenn Greenwald (former Guardian journalist who aided the Snowden Op) launched a news media venture called First Look.  And what […]

read more

Automated OSINT

Automated OSINT

In the Open Source Intelligence (OSINT) portion of a course a couple weeks ago, a student told me about a website called If This, Then That (IFTTT).  I signed up for an account, and I’d encourage y’all to do the same. The first thing I did was create an email […]

read more