Russia & China employ disinformation to degrade US democracy

Russia & China employ disinformation to degrade US democracy

This article seeks to explore the concept of disinformation, its impact on current events, and how average citizens can be cognizant of, recognize, and learn to avoid its harmful effects. Specifically, we will discuss the growing trend of state-sponsored disinformation campaigns, their goals, and several recent examples of them. This is an expansive and incredibly […]

ANTIFA: The movement that Trump wants to declare a terrorist organization

ANTIFA: The movement that Trump wants to declare a terrorist organization

On Sunday, President Trump tweeted that the United States will be declaring Antifa a terrorist organization in response to the ongoing civil unrest across the country. His tweet has raised numerous legal and constitutional questions. Although the President can use an executive order to label individuals or groups as terrorists, the very nature of the […]

Deadbolt security: Your guide to Forced Entry Resistance

Deadbolt security: Your guide to Forced Entry Resistance

Editor’s note: This article was originally published by Justin “Graveyard” Fields for Swift | Silent | Deadly. This article contains affiliate links. In my last post on physical security I talked about improving the security of your locking knobset. This time I am going to talk about the real workhorse of personnel door security: the […]

Africa’s little known piracy hot-spot and how to counter it

Africa’s little known piracy hot-spot and how to counter it

Editor’s note: This article was written by Ana-Maria Baloi and originally published on Grey Dynamics. This report examines the benefits of using satellite imagery in countering piracy activity in the Gulf of Guinea. For collection and processing, the author used Open Source Intelligence (OSINT) and Geointelligence (GEOINT). The reconstructed scenario is based on the following key […]

A horror story from my state’s Concealed Carry Weapon class

A horror story from my state’s Concealed Carry Weapon class

Editor’s note: This article was originally published by Justin “Graveyard” Fields for Swift | Silent | Deadly. This article contains affiliate links. I recently had to attend my state’s concealed carry class. Most concealed carriers don’t get to attend these classes too often. I haven’t attended one in years, but through a bit of a […]

Integrating Special Operations & paramilitary forces, an Indian perspective

Integrating Special Operations & paramilitary forces, an Indian perspective

Editor’s note: This article was written by Lieutenant General Prakash Katoch, a Special Operations officer in the Indian Army, and originally published on Mission Victory India. It offers an original perspective of affairs in Southern Asia and also a glimpse into the Indian Special Operations community.  The use of SF in conflict is as old […]

Huawei and the Chinese surveillance network in Africa

Huawei and the Chinese surveillance network in Africa

Editor’s note: This article was written by Eren Ersozoglu and originally published on Grey Dynamics.  Since 2012, the U.S. has accused Huawei of being a potential tool for surveillance abroad. While on the surface Huawei is not state-owned, Chinese legislation requires companies to assist in national intelligence work. And this should be viewed in the […]

Managing performance during high stress contingencies

Managing performance during high stress contingencies

When you are under immense performance stress and need to complete tasks, there is a tendency to want to speed up your actions. The consequence of doing this is that you are likely to make mistakes. Even worse, the faster your thinking process becomes under stress, the more you might second guess yourself. This is […]

Digital Security: How surveillance cameras uncovered a Mossad assassination

Digital Security: How surveillance cameras uncovered a Mossad assassination

We’ve been drawing more attention to digital security and privacy as of late, largely due to our upcoming digital security guide, which will become available in about a week. The inspiration for the guide was born from the need for a basic repository of easy-to-implement digital security hygiene practices that end-users (all of us with […]

Why the US will never fully back an independent Kurdistan

Why the US will never fully back an independent Kurdistan

The ongoing ethnic and religious strife in Iraq creates an opportunity for Kurdish nationalists to realize their aspirations and declare independence. Although the Kurds are a nation with a common culture, a shared identity, and have civic organizations that pursue nationalistic-type goals, they still do not have an internationally recognized state. And as we shall […]

How 9/11 Changed the Way the Federal Government Manages Crises

How 9/11 Changed the Way the Federal Government Manages Crises

Though discussion over whether protection or emergency management should receive fiscal priority has been ongoing for many years, reforms in response to 9/11 changed the whole debate. Following the 9/11 terror attacks, the administration of George W. Bush, with the permission of Congress, defined presidential disaster declaration authority as a national security instrument, thus drastically […]

Here’s how criminals hack your accounts and ruin your life

Here’s how criminals hack your accounts and ruin your life

At SOFREP, we’re passionate about digital security and privacy. Nick has done an amazing job covering the specifics of encrypted communications. I have attempted to provide an overview of how to establish secure comms in a manner that enables one to rely on commercially available “military-grade” encryption. Our aim is to enhance privacy, protect civil […]