Finding Power In Retreat {for intelligence field operators in advanced positions}

Battle_at_Dabulin

It is the fallacy of the field operator, especially the intrepid novitiate, to assume the total responsibility for mission success. This imagery spawned of fervent self improvement regiments, Hollywood and Showtime’s Homeland, stresses that the bulk of mission objectives is carried out solely by one single individual. In all actuality, there are inner and outer circles of operators, military or security personnel, and analysts to handle many of these responsibilities. The duty of the field operator lies not only in aggressive and relentless attack, but moreso in the gathering of intelligence and retreat to analyze and further strategize for future sorties in the field.

“The host thus forming a single united body, is it impossible either for the brave to advance alone, or for the cowardly to retreat alone.” —Sun Tzu, Art Of War

The benefits of a strong field operator in an advanced position seem obvious. They are welcome into places where they should perhaps not be welcomed. They are knowing of things they perhaps should not be knowing. They are a bridge between enemies on either side of conflict. This is a stressful position under even the most glorious circumstances, and worth a second glance. While it has been noted the fallacy to assume total mission responsibility of the new operator, the internal drive to do so (the quarterback running the touchdown) is strongly ingrained into the psyche of especially Americans. This is potentially dangerous, not only for the operator, but potentially for the mission at large.

Ami Toben of protectioncircle.org is a highly trained countersurveillance professional, often dealing with VIP force protection and covert applications. In his work, he details the “magic circle of protection” which includes an outer circle or perimeter of analysts, and inner circle of operators, and possibly even an elite innermost circle of praetorian guards. When operating in an advanced position, and for extended maneuvers, it does indeed behove the “lone” field operator to remember and heed these layers which are there not only for protection, but to ensure the overall mission success. This is the very definition of mission critical deployment, and the mark of higher strategy.

While it is true that under certain circumstances that no one is in a better or more advantageous position to deliver the mission’s most successful application, or coup de grace if you will, than the field operator in advanced position. Aggressive and relentless attack can have serious deficits which may be overlooked by someone enduring field-stress and the relevant mania associated with operating deep behind the lines. Overexposure leading unto vulnerability is a strong likelihood, but this can be mitigated by the wisdom of these simple and easy to remember maxims:

Accept retreat to avoid defeat.

Quit the fray to fight another day.

 

Go ahead, say them out loud to yourself several times until they are imprinted upon your memory. It is okay to let go, run, and hide. That is a time when you can come up with your best strategy for the next time you are ready to attack. Retreat is just as important as attack in a winning strategy. Remember that the attacker can often become overexposed; by retreating, a field operator can potentially flush the opposition out of their comfortable positions to send them searching, and therefore exposing them to countersurveillance and counterintelligence tactics. This could mean the difference between winning or losing in a particular theatre during a particular operation.

Last but not least, the strategy for defeat is that of the BLUETEAMThey have more resources, more capital, and ultimately more comfort than the REDTEAM in any engagement. Of course it is the tendency for defense to become complacent and soft, but a field operator in advanced position must be reminded to take it easy once in a while. Get some rest, eat some food, hit the gym, watch a movie. Stop overexposing yourself to the opposing force by constantly wearing yourself down with relentless attack.

Find Power In Retreat

 

 

Advertisements

The MANIC Mirror: Minimal Integration, Streamlined Function

promo-001

The Days Of Yore

In the days of yore, there was a lot that went into creating an integrated system which can mimic the multi-functionality of today’s smart phones. In this brief article, I will discuss how and why utilizing even a very inexpensive model of smart phone can be applied for incredible results while committing to fieldcraft and security excellence.

But first, a little history. The Universal Serial Bus or USB evolution of system architecture created a massive expansion for computing capabilities, especially in terms of multimedia applications. Evolving from the OG Industry Standard Architecture of motherboard design, the miniaturization and multithreading capability of computer machines was sure to reach an exponential increase. This meant that increasingly shorter periods of time would yield resulting smaller and more capable circuits. ISA moved on to become PCI (Peripheral Component Interconnect) allowing for higher data-streams within the architecture especially reflected in video processing definition. And now in regular implementation is the SCSI (Small Computer Systems Interface) which allows for such communications between internal motherboards and external devices such as tape and disk drives.

Back to USB. The Universal Serial Bus allowed for many, meaning up to 144 daisychained external devices to be connected to the system. Now our computers had eyes, ears, and mouths with which we could interface directly and begin to envision what would come in the future.

The MANIC (magic) Mirror

Minimal Architecture Necessary For Intelligent Cognition is a concept outlined in the white papers by adroit cybersecurity researcher for Pentagon and Department Of Defense, Michael Gagnon. It entails utilizing the very least amount of physical hardware to enable the highest digital functionality of a computer system. As technical as this sounds, it can easily be broken down and translated into intelligence fieldcraft and other business applications.

The smart phone, as I have labeled the MANIC Mirror was most likely introduced to pop-culture in 1935 with the production of Walt Disney’s Snow White. That was a long time ago, way before computers had any chance of being perceived in the way they are presently manifest. Here we see a flat or two-dimensional object which seemingly or magically projects the ability to remote view across great distances and perhaps even time. It also allows for remote communication with an advanced and/or artifical intelliegnce. The magic mirror of old is now a reality, you most likely have one in your hands with which you are reading this article, or perhaps on your desk charging next to your larger computer.

In Security Terms

The MANIC Mirror is an excellent tool, far too often unrealized for it’s full capabilities especially in deployment for security and intelligence applications. Depending on what capabilities your mission specific operation entails, there is most likely “an app for that.”

There are far too numerous applications and implementations in which cheaply purchased and freely configured Android smart phones may be utilized to drastically increase intelligence capabilities while afield. The tiny integrated camera and microphone are much more than just a video intercommunication device, but they are useful in terms of electronic surveillance. A pairing of smart phones can be synchronized to each other for wireless signals transference and spying deployment. The list goes on ad nauseum ad infinitum.

Special use of smart phones must also be considered in terms of systems integration. For example, your $500 surveillance drone will also come with an application which can be freely downloaded to the phone to allow an extended, aerial eye to take flight and expand your operational range up to 1.5 km. That’s without going too far into the budget. These things are truly incredible and are being underutilized and under-realized in the field.

There is a lot more to this, but I don’t want to give away all my secrets. If you are interested in accessing our expertise in operational smart phone deployment, please do not hesitate to contact Briq Haus Ltd. Security & Intelligence. Thank you for reviewing this article.

Sandbox To Fieldcraft: Ditching The Simulation

collage-2017-11-18

Playing In The Sandbox Is For Kids

[excerpt definition from Wikipedia]

In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures or software vulnerabilities from spreading. It is often used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system.[1] A sandbox typically provides a tightly controlled set of resources for guest programs to run in, such as scratch space on disk and memory. Network access, the ability to inspect the host system or read from input devices are usually disallowed or heavily restricted.

In the sense of providing a highly controlled environment, sandboxes may be seen as a specific example of virtualization. Sandboxing is frequently used to test unverified programs that may contain a virus or other malicious code, without allowing the software to harm the host device.[2]

All hackery aside, let’s take a step back and look at this in legitimate focus. The sandbox is a place designated for childplay. There is a spot on the playground, usually where the swings and other hardware are located where a pit is dug out and filled with sand on which the children play. The sand not only provides a medium with which the children can build the castles they envision, but a soft ground from which the blunt trauma of falling from a height may affect. I know this, because as a youngster I was a daredevil and jumping from a swing set led to a slight fracture of my radius. Thankfully, for the sand, I did not have to experience any worse of a consequence from my intrepid and frankly stupid maneuvers.

The same children playing in the sandbox are the ones whom grow up to perchance die on the beaches of theatre. I agree that this is an extremely stark comparison, with some grim consequencese for casual ignorance. Perhaps, conceptually, the idea of swords to ploughshares may be a goal to keep in mind, however the fallacy of importing only butter and no steel may spell the doom of an enterprise, or generation. There is not better time to take the kids out of the sandbox and drop them onto the beaches of conflict than right now. That’s because learning in a simulated environment is akin to handicapping the process by which we operate during mission critical scenarios.

Translated For Security Measures

Briq Haus Ltd. Security & Intelligence operatives are fully versed and trained in both aspects of security operations; sandbox and fieldcraft. While the benefit of practice in a secluded environment separate from the harsh realities of consequence and effect may be evident in reports and documents, it is a rare thing that during real-time security exercises and operations that enough streaming data is retained for the intention of creating some slide-show or powerpoint presentation. In the real world, there are ongoing causal relationships between the interplay of hostile foreign intelligences and mission-specific imperatives. The continuing dynamic and morphic environment of the field require out-of-the-box thinking, not delusional but rather unconventional.

Between the combined expertise of our information technology and intelligence community professionals, Briq Haus Ltd. not only boasts the boardroom banter to deliver effective presentation and slideshows as per sandbox experimentation dictates, but we have tried-and-true tested in the trenches fieldcraft experience in being exposed to the evolving risk dynamic and threat platform wielded by hostile foreign intelligences co-operating within the framework of real-world, non-simulated ongoing security operations. Being increasingly tested above and beyond the imagined or preset boundaries of a security experiment within a sandbox environment forces the experts on my team to constantly and consistently demonstrate proof-of-work mastery of security implementation and product deployment in the professional corporate theatre. We are not corporate goons, nor are we classroom geeks, we are ex-military and intelligence professionals with backgrounds ranging from digital to physical warfare, and with experience in advanced security environments actualizing each domain of the security spectrum; physical, logistical, analytical, and digital.

Professional Security Assurance

By consigning your security requirements to the oversight and analysis of the Briq Haus Ltd. team, you are ensuring that the utmost precision and dedication is applied to discovering, identifying, and patching any and all vulnerabilities in your business or other operation. The Briq Haus Ltd. “Perfect Security Suite” is your one step solution to have all your concerns handled and put to ease by our experts in these and all related regards. We are not discouraged or daunted by any of the present dangers lurking among the faceless corporate mass. We know that any single entity may wear the mask of friend, and turn out to be a formidable adversary or inside threat.

Briq Haus Ltd. Security & Intelligence is not limited by our challenges; but rather, we challenge all limits. Contract with us today, and rest at ease that your security concerns are in the hands of serious and capable operators. Thank you for considering us.