Quantcast

Archives

New OPSEC Course

New OPSEC Course

Slowly I’m expanding my course offerings.  I just signed up with Brock at FreeNorthCarolina to do a one day Operations Security (OPSEC) course at the Spring Patriot Convention in May (OPSEC violation!).  I had a blast last year so go if you have the opportunity.  There are lots of great […]

read more

Invasion Models

Invasion Models

For the benefit of quasi-academic exercise, let’s assume that the absolute worst happens in Connecticut (CT): a federal invasion.  (Although the likelihood is low right now, it could be a plausible scenario in another state for the government of tomorrow.)  If I was tasked to analyze and wargame that scenario, […]

read more

Connecticut BICC/E

Connecticut BICC/E

Over at Forward Observer Dispatch, I’m going to lead a project that examines the ground situation and develops potential Regime courses of action (COA) in Connecticut.  If you’re interested, I’d love to have you join.  We’ll be starting a new project each month.  Right now, we’re working through an Area […]

read more

Principles of Clandestine Communications

Principles of Clandestine Communications

-By-Steven Barry Face-to-face meetings, conducted secretly between operational personnel, are known as clandestine meetings. Such meetings are employed frequently in the field; chiefly with regard to management and administrative func­tions.In general, the advantages of clandestine meetings are 1) they save time, 2) they are used as a countermeasure against some […]

read more

Online Courseware

Online Courseware

Catfishbrody gets some major props for telling me about Coursera. In addition to developing some online courseware for Forward Observer Dispatch, I’m going to enroll in a few free online course via Coursera.  This is just one of many websites that features online courses from Yale, MIT, Stanford, and other […]

read more

The Case for OSINT

The Case for OSINT

Open Source Intelligence (OSINT) information makes up 80-90% of all intelligence information because there are so many sources and collectors.  Every website, news report, magazine article, and speech produces OSINT information.  Every Patriot is a sensor, so it’s incumbent on us to utilize all these collectors of intelligence information because […]

read more

Community Security Checklist

Community Security Checklist

A friend suggested that I write an article about the things I’d do to prepare my community.  All talk of “action” aside, there are a handful of tasks that each of us should be doing in order to prepare to protect our communities and ourselves.  I’ve prepared a JPEG (download […]

read more

Countermeasure: Information Is About Control

Countermeasure: Information Is About Control

This is a very good article about Oakland, California’s Domain Awareness Center (DAC).  In classes we often talk about Information Dominance; we try to get the edge on our adversaries, and our adversaries on us.  Information Dominance means owning the information domain, and is much easier to gain with multimillion […]

read more

Syria: Beseiged Areas

Syria: Beseiged Areas

I haven’t kept up to date with Syria.  So many places, so little time.  But I did come across this website, and it shows some excellent examples of how we delineate Areas of Operation (AO), Operation Boxes (OpBox), or as this map shows, besieged areas or occupied/held territory. (Read the […]

read more

Rural Defense Units and What Popular Opinion Tells Us

Rural Defense Units and What Popular Opinion Tells Us

I keep reading about these ‘Rural Defense Units’ in Mexico, which are forming to protect their communities from drug cartels.  Last month, the Mexican Government passed a law authorizing the Rural Defense Units, essentially the unorganized militia numbering up to 20,000 strong, to participate alongside federal forces in rooting out […]

read more