Confidential
Confidential
Intelligence Failure
Confidential
Confidential

Cryptography: Breaking the Glass Ceiling

Cryptography and Intelligence, in both times of war and peace, is oftentimes thought of as a man’s world. Particularly in areas of naval or military intelligence. The achievements of famous male cryptographers such as Alan Turing are household knowledge. However,…

  • [cbxwpbookmarkbtn]
Confidential

Structured Analytic Techniques: Tradecraft

Structured analytic techniques question intuitive judgements by identifying a wider range of options for analysts to consider. There is no formula to get it always right, but the use of such techniques can reduce the frequency of error by analysts….

  • [cbxwpbookmarkbtn]
Confidential

Active Measures: The Tradecraft

Active measures: A short Intro Active Measures (In Russian, “aktivnye meropriyatiya”) was coined in the 1920s. It is a broad concept generally referring to Russian offensive operations that are designed to spread disinformation, deceive, and sabotage foreign nations. In real…

  • [cbxwpbookmarkbtn]
Confidential

Chushi Gangdruk: CIA Trained Khampa Guerrillas to the Rescue of Dalai Lama  

Chushi Gangdruk is a Khampa Tibetan guerrilla warfare group, whose name translates as Four Rivers, Six Ranges, or the Kham Four Rivers. CIA and the Cold War-era fight against global communist expansion go hand and hand. In a lesser-known tale…

  • [cbxwpbookmarkbtn]
Confidential

COINTELPRO: The WikiLeaks of the 1960’s

COINTELPRO is a highly controversial domestic surveillance program carried out by the FBI in the 1960s. What was supposed to be a secret anti-Communist surveillance operation turned into a weaponized apparatus of the FBI with sights focused on a wide…

  • [cbxwpbookmarkbtn]
Confidential

MK-Ultra: The CIA Infiltrates the Human Psyche

MK-Ultra was a CIA program taking place between the 1950s and 1960s. As a response to rumours of Cold War antagonists performing mind control techniques on US prisoners of war. This article examines the projects origins, methodology, and aftermath. The…

  • [cbxwpbookmarkbtn]
Confidential

The Sayanim: Mossad’s International Volunteers

The Sayanim are loyal. This is what fuels their mission. The flexibility in their roles give the Mossad a unique operational capability “Loyalty to the Nation all the time, loyalty to the Government when it deserves it.” -Mark Twain In…

  • [cbxwpbookmarkbtn]
Citizen Spies
Confidential

United States Citizen Spies

“Snitches get Stiches” Citizen spies in the United States may sound absurd, but tactic itself is nothing new in the history of surveillance. Far from it actually. And if the information about a program involving domestic citizen informants is true,…

  • [cbxwpbookmarkbtn]
Confidential

Troll-on-Troll: Russian-French Cyber Information War in Africa

This Grey Dynamics African intelligence article analyses the misinformation war between Russian and French troll-on-troll actors. It is important to assess the differences in Russian and French information campaigns, but to note the similarity when engaging with one another.  Key…

  • [cbxwpbookmarkbtn]
Confidential

Razzle Dazzle: Against Facial Recognition

Tactics against facial recognition, such as Dazzle make-up need to be further developed before its detractors can use it more effectively. Key Judgments KJ–1. Current facial recognition technologies will almost certainly face legal opposition before widespread implementation is achieved. KJ–2. Current tactics…

  • [cbxwpbookmarkbtn]