Calling Out the Durango Herald

See if you get through more than a couple paragraphs of this gem before feeling sick to your stomach.  I embrace the hate.  This weaselly Steve Buscemi look alike, fondling his airsoft pistol like every Lethal Weapon veteran stereotype while he recounts losing men in Afghanistan, I love every detail.  It’s so perfect that I […]

The US Navy’s Deadly MK6 Attack Dolphin Program

In the Fleet’s Operational Marine Mammal Systems (MMS), the Navy uses dolphins and sea lions to find and mark the location of underwater objects. Dolphins are essential because their exceptional biological sonar is unmatched by hardware sonars in detecting objects in the water column and on the sea floor. Sea lions are used because they […]

The Myth of the CIA and the Trans-Siberian Pipeline Explosion

There’s a well-known expression that if you repeat a rumor often enough, it becomes a fact. Such is the case with the oft-repeated rumor that the CIA was responsible for the Trans-Siberian pipeline explosion in June, 1982 by sabotaging the SCADA system that ran the pipeline. The latest iteration of that rumor was in the […]

Cyber Warfare: The “Team” in Red Team

As the name implies a Red Team is a team. In the world I live in – information and physical security – it is comprised by a variety of experts in different areas. Each member can perform the other’s duty but each one has a specialty and he or she is responsible for it. I […]

My Time as a Targeting Officer at the CIA

I’m excited to introduce Nada Bakos, a former CIA Analyst and Targeting Officer to SOFREP and I hope we see more of her on the site and potentially on SOFREP TV. Here’s a short bio: Nada Bakos, a former Central Intelligence Agency (CIA) analyst on the team charged with analyzing the relationship between Iraq-AQ-9/11. During the […]

Offensive Information Warfare and Red Teams

It’s 0100. The moon sits high in the sky over the target’s facility. Four men dressed in BDUs and gear are sneaking in by the tree line, about 50 meters outside the building outer perimeter fence. Pausing occasionally to peer through night vision monoculars to scan the perimeter. They make it to the final penetration […]

The Next War on Terror Will Be Fought Online

The video below was shared with me by SOFREP community moderator Laura Walker. It is an excellent example of an open source brief that discusses how extremist groups are using online technologies to communicate securely, promote “the cause”, train, launder money, plan and attack. Feel free to share your thoughts and links to extremists groups you […]

Remembering Those Who Serve and Die in Secret

With Memorial Day almost upon us, the CIA has released the names of 15 of its officers who over the past 30 years have died in the line of duty. When CIA officers are working under cover, their cover identities are maintained even after death in order to not expose their networks or put the […]

Suits, Spooks, and a Revolution in Security Affairs

The U.S. and most developed countries have undergone a Revolution in Military Affairs since the end of the first Iraq war. Both China and Russia have been investing large sums in RMA, converting their old-style military into one that’s network-centric in order to be more competitive with the U.S. Admiral McRaven introduced a new RMA […]

The NSA’s Utah Data Center: Protecting US Citizens or Spying on Them?

WIRED did an excellent write up on the NSA’s new Data Center in Utah and I highly encourage you to check it out. The world we live in is getting smaller and smaller due in large part to the pervasiveness of the internet, communications and easy access to a world of information at the touch […]