Articles written by: Samuel Culper III

Principles of Clandestine Behavior

Principles of Clandestine Behavior

-by- Steven Barry Individual underground and resistance operatives expected to cope with sophisticated law enforcement practices or security organizations are often at a singular disadvantage in their efforts to understand systematized techniques and practices of clandestine behavior. The varieties of this behavior, known collectively as “tradecraft,” are a traditional province […]

read more

The Appalachian Redoubt

The Appalachian Redoubt

BLUF: Download this Redoubt Intelligence Flowchart and apply it towards your collection plan. I’ll always remember former SecDef Donald Rumsfeld for a few things.  For one, he read one of my intelligence products when I was a young PFC in Afghanistan (some staff hoople head briefed it to him but […]

read more

New OPSEC Course

New OPSEC Course

Slowly I’m expanding my course offerings.  I just signed up with Brock at FreeNorthCarolina to do a one day Operations Security (OPSEC) course at the Spring Patriot Convention in May (OPSEC violation!).  I had a blast last year so go if you have the opportunity.  There are lots of great […]

read more

Invasion Models

Invasion Models

For the benefit of quasi-academic exercise, let’s assume that the absolute worst happens in Connecticut (CT): a federal invasion.  (Although the likelihood is low right now, it could be a plausible scenario in another state for the government of tomorrow.)  If I was tasked to analyze and wargame that scenario, […]

read more

Connecticut BICC/E

Connecticut BICC/E

Over at Forward Observer Dispatch, I’m going to lead a project that examines the ground situation and develops potential Regime courses of action (COA) in Connecticut.  If you’re interested, I’d love to have you join.  We’ll be starting a new project each month.  Right now, we’re working through an Area […]

read more

Principles of Clandestine Communications

Principles of Clandestine Communications

-By-Steven Barry Face-to-face meetings, conducted secretly between operational personnel, are known as clandestine meetings. Such meetings are employed frequently in the field; chiefly with regard to management and administrative func­tions.In general, the advantages of clandestine meetings are 1) they save time, 2) they are used as a countermeasure against some […]

read more

Online Courseware

Online Courseware

Catfishbrody gets some major props for telling me about Coursera. In addition to developing some online courseware for Forward Observer Dispatch, I’m going to enroll in a few free online course via Coursera.  This is just one of many websites that features online courses from Yale, MIT, Stanford, and other […]

read more

The Case for OSINT

The Case for OSINT

Open Source Intelligence (OSINT) information makes up 80-90% of all intelligence information because there are so many sources and collectors.  Every website, news report, magazine article, and speech produces OSINT information.  Every Patriot is a sensor, so it’s incumbent on us to utilize all these collectors of intelligence information because […]

read more

Community Security Checklist

Community Security Checklist

A friend suggested that I write an article about the things I’d do to prepare my community.  All talk of “action” aside, there are a handful of tasks that each of us should be doing in order to prepare to protect our communities and ourselves.  I’ve prepared a JPEG (download […]

read more

Countermeasure: Information Is About Control

Countermeasure: Information Is About Control

This is a very good article about Oakland, California’s Domain Awareness Center (DAC).  In classes we often talk about Information Dominance; we try to get the edge on our adversaries, and our adversaries on us.  Information Dominance means owning the information domain, and is much easier to gain with multimillion […]

read more