Archives

Feedback for Security 2.0

Feedback for Security 2.0

NOTE: We have a few seats left for the Salt Lake City ICAC at the end of this month.  This course is constantly evolving based on your expectations of the future, and it’s my goal to train you as if you were going to be operating on my team post-SHTF.  […]

read more

Wyoming’s 84th CST

Wyoming’s 84th CST

Last week I was driving through Wyoming, my favorite state in the Union and former home, and passed two blue trucks (looked sort of like ambulances) with .gov plates.  It was something I’d never seen before, and as I passed them I saw “84th CST” on their doors, along with […]

read more

Principles of Clandestine Behavior

Principles of Clandestine Behavior

-by- Steven Barry Individual underground and resistance operatives expected to cope with sophisticated law enforcement practices or security organizations are often at a singular disadvantage in their efforts to understand systematized techniques and practices of clandestine behavior. The varieties of this behavior, known collectively as “tradecraft,” are a traditional province […]

read more

The Appalachian Redoubt

The Appalachian Redoubt

BLUF: Download this Redoubt Intelligence Flowchart and apply it towards your collection plan. I’ll always remember former SecDef Donald Rumsfeld for a few things.  For one, he read one of my intelligence products when I was a young PFC in Afghanistan (some staff hoople head briefed it to him but […]

read more

New OPSEC Course

New OPSEC Course

Slowly I’m expanding my course offerings.  I just signed up with Brock at FreeNorthCarolina to do a one day Operations Security (OPSEC) course at the Spring Patriot Convention in May (OPSEC violation!).  I had a blast last year so go if you have the opportunity.  There are lots of great […]

read more

Invasion Models

Invasion Models

For the benefit of quasi-academic exercise, let’s assume that the absolute worst happens in Connecticut (CT): a federal invasion.  (Although the likelihood is low right now, it could be a plausible scenario in another state for the government of tomorrow.)  If I was tasked to analyze and wargame that scenario, […]

read more

Connecticut BICC/E

Connecticut BICC/E

Over at Forward Observer Dispatch, I’m going to lead a project that examines the ground situation and develops potential Regime courses of action (COA) in Connecticut.  If you’re interested, I’d love to have you join.  We’ll be starting a new project each month.  Right now, we’re working through an Area […]

read more

Principles of Clandestine Communications

Principles of Clandestine Communications

-By-Steven Barry Face-to-face meetings, conducted secretly between operational personnel, are known as clandestine meetings. Such meetings are employed frequently in the field; chiefly with regard to management and administrative func­tions.In general, the advantages of clandestine meetings are 1) they save time, 2) they are used as a countermeasure against some […]

read more

Online Courseware

Online Courseware

Catfishbrody gets some major props for telling me about Coursera. In addition to developing some online courseware for Forward Observer Dispatch, I’m going to enroll in a few free online course via Coursera.  This is just one of many websites that features online courses from Yale, MIT, Stanford, and other […]

read more

The Case for OSINT

The Case for OSINT

Open Source Intelligence (OSINT) information makes up 80-90% of all intelligence information because there are so many sources and collectors.  Every website, news report, magazine article, and speech produces OSINT information.  Every Patriot is a sensor, so it’s incumbent on us to utilize all these collectors of intelligence information because […]

read more