⟨ BACK | UPCOMING INTEL
Layering Method of Defeating X-Ray Scanners
[ PROCESSING ]
Behavioral Camouflage Tradecraft
[ PROCESSING ]
International Exfiltration Without Passport
[ PROCESSING ]
Vehicle Counter Ambush Tactics
[ PROCESSING ]
Coercive Persuasion Techniques
[ PROCESSING ]
CIA Mind Control Tactics For Everyday Use
[ PROCESSING ]
Bank Robbery Hostage Response Guide
[ PROCESSING ]
Counter-Anonymity Techniques
[ PROCESSING ]
Predicting Human Behavior Tradecraft
[ PROCESSING ]
Vehicular Item Concealment
[ PROCESSING ]
Natural Hair Disguise Methodology
[ PROCESSING ]
Improvising Safe Houses as Needed
[ PROCESSING ]
Profiling People Using Their Social Media
[ PROCESSING ]
Social Anonymity Techniques
[ PROCESSING ]
Escape and Evasion in Everyday Life
[ PROCESSING ]
Prison Escape Guide: Part 2
[ PROCESSING ]
The Bratva: Origins, Structure, and Purpose
[ PROCESSING ]
Venomous Knife Device
[ PROCESSING ]
Transacting Anonymously and Untraceably
[ PROCESSING ]
The Concept of Accessing Any Secure Building
[ PROCESSING ]
Wristwatch Wealth Transferring Method
[ PROCESSING ]
Emotionally Conditioning to Kill
[ PROCESSING ]
Overcoming The Pain to Continue The Fight
[ PROCESSING ]
The Secret to Weapon Mastery
[ PROCESSING ]
Resisting Interrogation Tactics
[ PROCESSING ]
Strategically Dealing With Addicts
[ PROCESSING ]
The Reverse “Can I Buy You a Drink” Tactic
[ PROCESSING ]
Infiltrating Any Business as a “Consultant”
[ PROCESSING ]
How to Read a Crime Scene
[ PROCESSING ]
Sleeping With Your Eyes Open
[ PROCESSING ]
Open Laptop Forced Capture Security Deterrent Hack
[ PROCESSING ]
Strategic Home Weapon Positioning
[ PROCESSING ]
Predictive Street Incident Method
[ PROCESSING ]
The ‘Taxi Driver Asset’ Directive
[ PROCESSING ]
Reducing Cognitive Dissonance
[ PROCESSING ]
Assertiveness Tradecraft Training
[ PROCESSING ]
The ‘Blood Loss Replenishing’ Directive
[ PROCESSING ]
How a CIA Operative Engages a Street Fight
[ PROCESSING ]
Method of Getting Passed The Bouncer
[ PROCESSING ]
The Bartering For Escape & Evasion Guide
[ PROCESSING ]
The Art of Strategic Hype
[ PROCESSING ]
Surviving in a Foreign City Without Money or Assets
[ PROCESSING ]
Using an Opponent’s Size Against Them in Combat
[ PROCESSING ]
A Former Spy’s Retirement Investments
[ PROCESSING ]
Career Criminal Situational Awareness Method
[ PROCESSING ]
Car Relay Attack: Anti-Theft Guide
[ PUBLISHED ]
Engaging Multiple Assailants in The Field
[ PUBLISHED ]
TSA Agent Method of “Profiling” Passengers
[ PUBLISHED ]
Special Forces Multitasking Method
[ PUBLISHED ]
Technical Surveillance Counter Measures (TSCM)
[ PUBLISHED ]
The Eisenhower Decision Matrix
[ PUBLISHED ]
How to Escape a Burning Building: Part 1
[ PUBLISHED ]
FBI Agent Method of Situational Awareness
[ PUBLISHED ]
Tracking People in Urban Environments
[ PUBLISHED ]
CIA Risk Assessment Methodology
[ PUBLISHED ]
Stealth Wealth Detection Guide
[ PUBLISHED ]
Facial Recognition System Countermeasures
[ PUBLISHED ]
SCIF: Sensitive Compartmented Information Facility
[ PUBLISHED ]
HUMINT: Human Intelligence Tradecraft
[ PUBLISHED ]
The Art of The Ambush
[ PUBLISHED ]
The Element of Surprise Tradecraft
[ PUBLISHED ]
The Making of a CIA Operative
[ PUBLISHED ]
Managing and Reporting a Missing Person
[ PUBLISHED ]
Enhanced Interrogation Techniques
[ PUBLISHED ]
FBI Method of Profiling: Guide
[ PUBLISHED ]
The Extradition Process Guide
[ PUBLISHED ]
The ‘Social Anonymity’ Directive
[ PUBLISHED ]
Combat Technicals of Knife Stab Wounds
[ PUBLISHED ]
Cell Phone Anti-Tracking Measures
[ PUBLISHED ]
Special Forces Stealth Tactics For The Streets
[ PUBLISHED ]
What Being Tased With a TASER Feels Like
[ PUBLISHED ]
Counter-Surveillance Detection
[ PUBLISHED ]
The ‘Power/Authority’ Phrase of Persuasion
[ PUBLISHED ]
The Smell of a Dead Human Body
[ PUBLISHED ]
The Method of Enduring Torture
[ PUBLISHED ]
How to be Untrackable in The Real-World
[ PUBLISHED ]
The Art of Being Hard to Kill
[ PUBLISHED ]
Stun Grenade Attack: Response Guide
[ PUBLISHED ]
How to Beat a Polygraph Test: Guide
[ PUBLISHED ]
Identifying if Your Cell Phone is Compromised
[ PUBLISHED ]
The ‘Second Location’ Directive
[ PUBLISHED ]
Extracting Secrets Through Normal Conversation
[ PUBLISHED ]
The Darknet Black Market: Guide
[ PUBLISHED ]
CQC Martial Art of Covert Operatives
[ PUBLISHED ]
Police Incident/Situation Response Procedure
[ PUBLISHED ]
The ‘Cold Reading’ Tradecraft Method
[ PUBLISHED ]
Luminol: Detection Countering
[ PUBLISHED ]
The Counter-Interrogation Method
[ PUBLISHED ]
Detecting a Person’s ‘Tell’ in Real-Time
[ PUBLISHED ]
The ’21-Foot Rule’ of Firearms
[ PUBLISHED ]