Using Social Media to Create False Digital Trails and Keep Adversaries Off Your Tail
Your digital presence is both a tool and a vulnerability, utilizing the skill of creating false social...
Your digital presence is both a tool and a vulnerability, utilizing the skill of creating false social...
In this modern world of information warfare, crafting counter-disinformation strategies is essential for operatives and civilians alike...
This guide arms you with the tradecraft necessary to conduct your own cybersecurity audits, ensuring your personal...
A $5 Wrench Attack refers to a situation where physical force or intimidation, exemplified by something as...
The tradecraft strategy of blending in by looking poor; for the ability to move unnoticed, collect intelligence,...
A specialized tradecraft discipline aimed at detecting, neutralizing, and preventing unauthorized electronic surveillance and information theft. [INTEL:...
Just as an operative would use a “burner” cell phone for discreet communications, the “Burner Laptop Method”...
The tradecraft guide of cell phone anti-tracking methods to prevent, counter or reduce an entity’s ability to...
The tradecraft primer and guide on counter-surveillance detection for use as a professional in operations and as...
The CIA officer’s directive on the “false sense of security” phenomenon; understanding, overcoming and countering this dangerous...
The CIA officer’s guide on the fundamentals of assessing physical security in real-time, identifying vulnerabilities to address...
A tradecraft guide on how to create and use burner emails for OPSEC and anonymity for professional...