⟨ BACK | UPCOMING INTEL
Negative Reinforcement Traps
[ PROCESSING ]
Forensic Psychology Tradecraft
[ PROCESSING ]
Jacket Pocket (DIY) Booby Trap
[ PROCESSING ]
Document Forgery Detection
[ PROCESSING ]
Layering Method of Defeating X-Ray Scanners
[ PROCESSING ]
Behavioral Camouflage Tradecraft
[ PROCESSING ]
International Exfiltration Without a Passport
[ PROCESSING ]
Vehicle Counter Ambush Tactics
[ PROCESSING ]
CIA Mind Control Tactics
[ PROCESSING ]
Profiling People Using Their Social Media
[ PROCESSING ]
Bank Robbery Hostage Response Guide
[ PROCESSING ]
Counter-Anonymity Techniques
[ PROCESSING ]
Predicting Human Behavior Tradecraft
[ PROCESSING ]
Vehicular Item Concealment
[ PROCESSING ]
Natural Hair Disguise Methodology
[ PROCESSING ]
Improvising Safe Houses as Needed
[ PROCESSING ]
CIA ‘Instant Pain Relief’ Technique
[ PROCESSING ]
Decoding Written Communication
[ PROCESSING ]
Prison Escape Guide: Part 2
[ PROCESSING ]
The Bratva: Origins, Structure, and Purpose
[ PROCESSING ]
Venomous Knife Device
[ PROCESSING ]
Transacting Anonymously and Untraceably
[ PROCESSING ]
Turning a Criminal Into an Informant
[ PROCESSING ]
Wristwatch Wealth Transferring Method
[ PROCESSING ]
Emotionally Conditioning to Kill
[ PROCESSING ]
CIA Non-Destructive Entry Guide
[ PROCESSING ]
Asset Recruitment and Management
[ PROCESSING ]
Establishing Safe Houses in the City
[ PROCESSING ]
Improvised Vehicle Hardening
[ PROCESSING ]
The Reverse “Can I Buy You a Drink” Tactic
[ PROCESSING ]
Sleeping With Your Eyes Open
[ PROCESSING ]
Open Laptop Forced Capture Security Deterrent Hack
[ PROCESSING ]
Strategic Home Weapon Positioning
[ PROCESSING ]
The ‘Taxi Driver Asset’ Directive
[ PROCESSING ]
How a CIA Operative Engages a Street Fight
[ PROCESSING ]
The Art of Strategic Hype
[ PROCESSING ]
Surviving in a Foreign City Without Money or Assets
[ PROCESSING ]
Using an Opponent’s Size Against Them in Combat
[ PROCESSING ]
A Spy’s Retirement Investments
[ PROCESSING ]
Master Criminal Situational Awareness Method
[ PROCESSING ]
Improvised Urban Survival Gear
[ PROCESSING ]
CIA ‘Counter-Drone’ Measures
[ PUBLISHED ]
Staging Your Own Death and Vanishing Without a Trace
[ PUBLISHED ]
12 Covert Operative Rookie Mistakes
[ PUBLISHED ]
Being ‘Unreadable’ as an Operative
[ PUBLISHED ]
Minding an Enemy’s Distance
[ PUBLISHED ]
CIA ‘Personal Identity’ Management
[ PUBLISHED ]
Car Relay Attack: Anti-Theft Guide
[ PUBLISHED ]
Living Anonymously in a Foreign Country
[ PUBLISHED ]
Engaging Multiple Assailants in The Field
[ PUBLISHED ]
TSA Agent Method of “Profiling” Passengers
[ PUBLISHED ]
Special Forces Multitasking Method
[ PUBLISHED ]
Technical Surveillance Counter Measures (TSCM)
[ PUBLISHED ]
How to Escape a Burning Building: Part 1
[ PUBLISHED ]
FBI Agent Method of Situational Awareness
[ PUBLISHED ]
Tracking People in Urban Environments
[ PUBLISHED ]
CIA Risk Assessment Methodology
[ PUBLISHED ]
Facial Recognition System Countermeasures
[ PUBLISHED ]
FBI Method of Profiling: Guide
[ PUBLISHED ]
Combat Technicals of Knife Stab Wounds
[ PUBLISHED ]
Cell Phone Anti-Tracking Measures
[ PUBLISHED ]
Escaping From a Locked Police Vehicle
[ PUBLISHED ]
The ‘Tactile Intimidation’ Tactic
[ PUBLISHED ]
Counter-Surveillance Detection
[ PUBLISHED ]
The ‘Power/Authority’ Phrase of Persuasion
[ PUBLISHED ]
CIA ‘Perimeter Security’ Guide
[ PUBLISHED ]
The Method of Enduring Torture
[ PUBLISHED ]
How to be Untrackable in The Real-World
[ PUBLISHED ]
Active ‘Gray Man’ Camouflage
[ PUBLISHED ]
The Art of Being Hard to Kill
[ PUBLISHED ]
Stun Grenade Attack: Response Guide
[ PUBLISHED ]
How to Beat a Polygraph Test: Guide
[ PUBLISHED ]
Evading a Sniper in an Urban Environment
[ PUBLISHED ]
The ‘Second Location’ Directive
[ PUBLISHED ]
Extracting Secrets Through Normal Conversation
[ PUBLISHED ]
The Darknet Black Market: Guide
[ PUBLISHED ]
CQC ‘Silent Takedown’ Techniques
[ PUBLISHED ]
Police Incident/Situation Response Procedure
[ PUBLISHED ]
The ‘Cold Reading’ Tradecraft Method
[ PUBLISHED ]
Luminol: Detection Countering
[ PUBLISHED ]
The Counter-Interrogation Method
[ PUBLISHED ]
Detecting a Person’s ‘Tell’ in Real-Time
[ PUBLISHED ]