Archives

Che’s Catastrophic Counterintelligence Failures

Che’s Catastrophic Counterintelligence Failures

I’ve never been a huge fan of Che Guevara’s foco theory, which states that a small contingent of guerrillas can start a revolution and build popular support once operations are underway.  There’s too much hill to climb and too many potential missteps; the support is either there or it’s not. […]

read more

Introduction to Intelligence Support to the Warfighter

Introduction to Intelligence Support to the Warfighter

I’ve recently ‘teamed up’ with Max Velocity and agreed to moderate a sub-forum over at the MVT Forum called Intelligence Support to the Warfighter.  Here we’ll aggregate and solve the intelligence collection/analysis problems encountered on the tactical side and also work towards establishing a flat, open surface on which intelligence […]

read more

Mao vs Che

Mao vs Che

The Small Wars Journal (SWJ) puts out a lot of really great stuff.  For those who seek an academic understanding of warfare (and, really, who shouldn’t?), SWJ articles alone will put you head and shoulders above many of your peers. This essay (On Guerrilla Warfare, h/t the grugq) comparing and […]

read more

Feedback for Security 2.0

Feedback for Security 2.0

NOTE: We have a few seats left for the Salt Lake City ICAC at the end of this month.  This course is constantly evolving based on your expectations of the future, and it’s my goal to train you as if you were going to be operating on my team post-SHTF.  […]

read more

Wyoming’s 84th CST

Wyoming’s 84th CST

Last week I was driving through Wyoming, my favorite state in the Union and former home, and passed two blue trucks (looked sort of like ambulances) with .gov plates.  It was something I’d never seen before, and as I passed them I saw “84th CST” on their doors, along with […]

read more

Principles of Clandestine Behavior

Principles of Clandestine Behavior

-by- Steven Barry Individual underground and resistance operatives expected to cope with sophisticated law enforcement practices or security organizations are often at a singular disadvantage in their efforts to understand systematized techniques and practices of clandestine behavior. The varieties of this behavior, known collectively as “tradecraft,” are a traditional province […]

read more

The Appalachian Redoubt

The Appalachian Redoubt

BLUF: Download this Redoubt Intelligence Flowchart and apply it towards your collection plan. I’ll always remember former SecDef Donald Rumsfeld for a few things.  For one, he read one of my intelligence products when I was a young PFC in Afghanistan (some staff hoople head briefed it to him but […]

read more

New OPSEC Course

New OPSEC Course

Slowly I’m expanding my course offerings.  I just signed up with Brock at FreeNorthCarolina to do a one day Operations Security (OPSEC) course at the Spring Patriot Convention in May (OPSEC violation!).  I had a blast last year so go if you have the opportunity.  There are lots of great […]

read more

Invasion Models

Invasion Models

For the benefit of quasi-academic exercise, let’s assume that the absolute worst happens in Connecticut (CT): a federal invasion.  (Although the likelihood is low right now, it could be a plausible scenario in another state for the government of tomorrow.)  If I was tasked to analyze and wargame that scenario, […]

read more

Connecticut BICC/E

Connecticut BICC/E

Over at Forward Observer Dispatch, I’m going to lead a project that examines the ground situation and develops potential Regime courses of action (COA) in Connecticut.  If you’re interested, I’d love to have you join.  We’ll be starting a new project each month.  Right now, we’re working through an Area […]

read more