Quantcast

Archives

Radio Free Redoubt Show

Radio Free Redoubt Show

During a recent long drive, I plugged in some previous Radio Free Redoubt (RFR) podcasts.  If you’re a Redoubter and not listening, then you’re wrong.  I would even suggest that all Liberty-loving Americans, regardless of location, listen to John Jacob’s show.  He’s doing some great work in the Redoubt and […]

read more

The Importance of Good Scholarship

The Importance of Good Scholarship

I came across this article relaying the contents of an email USMC GEN James Mattis (Ret.) sent to a colleague about the importance of professional reading.  This hits home for many of us because our work requires a level of expertise such that direct experience alone is in itself insufficient.  […]

read more

Using Crime Reports

Using Crime Reports

Next week, we’re about to start going over a handful of posts about source recruiting and source operations; areas which have only been lightly covered on this blog.  That’s about to change. I was thinking earlier today about all the applications of source ops for the post-SHTF Patriot and/or prepper.  […]

read more

News Site

News Site

This blog won’t devolve into a news site.  Maybe I’ll start up a new blog to note interesting news articles dealing with intelligence, tradecraft, espionage, etc.  Would you be interested in a site like this? At any rate, here are a few news articles that are worthy of reading (in […]

read more

BICC/E Analysis

BICC/E Analysis

In the past week, we’ve touched on the BICC/E analytical method.  It’s best used for developing enemy courses of action (COA).  So if a key assumption is that we’ll be dealing with irregular threats like gangs, mobs, and criminals, or more conventional threats like regime forces (DHS, federal LEOs, military), […]

read more

Applied Conventional Analytical Tasking

Applied Conventional Analytical Tasking

NOTE: I’ve updated the Training page with upcoming courses for January.  This will be my last trip to the East Coast, maybe forever.  If you haven’t emailed me about getting a course scheduled, then your window of opportunity is JAN/FEB.  Otherwise, I’m going to focus on my relative AO.  Email […]

read more

OPSEC Considerations for Cell Phones

OPSEC Considerations for Cell Phones

It should be no surprise for anyone to hear that your cell phone is one of your largest liabilities.  Long before the NSA leaks, we knew the general tracking capabilities of government intelligence and surveillance agencies around the world. But today we found out a bit more about their specific […]

read more

United States Extremist Crime Database (ECDB)

United States Extremist Crime Database (ECDB)

The United States Extremist Crime Database (ECDB) on its face isn’t alarming.  I’m not even sure if this database is official or operational but people tracking crime isn’t new, nor is suspect.  You should note that this database tracks non-violent “far-right”crime as well. What I do find alarming, albeit par […]

read more

Intelligence and Probabilities

Intelligence and Probabilities

We’ve previously covered that the four factors of valuable intelligence information are timely, accurate, specific, and predictive.  Once we’ve collected information and analyzed it to create a finished intelligence product, we absolutely must present that information (which is timely, accurate, specific, and/or predictive) in a clear and concise manner.  What […]

read more

Quick Update

Quick Update

I hope everyone had a great Thanksgiving.  I’ve been busy with a few things, including expanding the Security Manual.  As is, it’s a primer but it really should be an entire volume (eventually).  Everyone who purchased the first ‘edition’ will be receiving the second in ebook form at no cost.  […]

read more