Counting Down to the New ITSTactical.com

We’ve got a pretty big announcement to share with you today and one that’s been hard to keep quiet about. For the past few months, we’ve been busy building the new ITSTactical.com and we’re launching all the awesomeness tomorrow!

Holding-1

“New Look, Same Great Taste!”

You’ve probably seen a few household products who state that claim and we mean it as well. Actually, let’s go one step further and say that while this is certainly a new ITS and we’re building on the “same great taste,” we’re always working to bring you our best.

Those who have been with us from the beginning know that we take our time. Chasing trends is not our style and we prefer to err on the side of methodical rather than flighty.

Keeping the great content you’re used to on ITS, but making it more easily accessible and available anytime and on any device was the driving force behind our redesign. We’re doing this with a responsive website that will automatically detect the resolution of the device you’re using. Smartphone? Tablet? Desktop? You’ll be able to trust you’re viewing ITS the best way possible, without having to download a separate app or get stuck in a mobile version of our site that doesn’t have the same great functionality as a desktop version. Responsive is where it’s at!

You’ll also notice a completely redesigned way to view ITS tomorrow, with infinite scrolling and a persistent header so you’ll always be within reach of the various article categories, as well as the shop, forum, ITS social media presence and even the membership dashboard.

While we’re migrating over to the new ITS Tactical, you’ll be unable to access our content and will see a holding page that will look like the image above. We’re planning to have everything back up by late Wednesday afternoon and you’ll still be able to keep in touch with us through social media during the downtime.

We can’t wait for you to see the new ITS Tactical and we couldn’t have done it without each and every one of you! Your support means more to us than we’ll ever be able to express, thank you!

Posted in ITS Information | Tagged , | 13 Comments

Reverse Peephole Security: Protecting Your Privacy with Peephole Covers

Peephole security is a real thing, especially when it comes to situations out of your control, like hotel rooms. It’s often neglected within the overall security picture, but nevertheless it’s something that you should consider.

Why should you worry about peephole security? Because products like Reverse Peephole Viewers exist and are easily obtainable by anyone. These viewers, when placed over the outward facing side of a peephole, allow the user to view what’s on the other side by realigning the otherwise unviewable lenses.

To counter the threat of reverse peephole viewers, today we’ll be taking a look at a few commercially available products to help you to determine which might be the best for your situation.

Defeating The Reverse Peephole Threat

Not to be confused with the Seinfield episode where Kramer reverses the peephole on his door on purpose so that “if somebody want’s to help themselves to an eyeful, we say enjoy the show.” A reverse peephole viewer is a bit on the pricey side, but as mentioned, easily obtainable by anyone.

I purchased a couple of solutions for this threat online a few months back and will share my pros and cons of each below. Basically, there’s two categories that these devices fall into, permanent and portable. Let’s first look at portable.

Portable Solutions

Privacy Logic is a company I stumbled onto while searching online and I really like their product offering. They offer a set of two SPEYEGUARD Portable Peephole Covers that simply slip into your existing peephole. The set of two will cover the most common peephole diameters of 3/8″ and 5/8″. Everything I’ve come across so far, has been able to fit these size covers. The top and bottom of the covers have cutouts that enable you to grasp the device to quickly remove it for a peek and easily reinsert it.

Peephole Covers 02

Peephole Covers 03

They’re made of ABS plastic and built well in the USA. The tabs that insert into the peephole are flexible enough to withstand multiple uses and still retain their functionality. Check out Privacy Logic for more information and to purchase these Portable Peephole Covers.

Permanent Solutions

To start off the two products we’ll be looking at in the permanent category, Privacy Logic also offers the SPEYEGUARD Fixed Peephole Cover. The backplate of this cover mounts to the door via a top and bottom mounting screw. The top cover locks into place on a ramp, which allows it to easily slide up and down as needed.

Peephole Covers 08

Peephole Covers 10

Peephole Covers 09

I did find that pilot holes are needed before attempting to simply screw the backplate in place on a door, that or a nail punch is what Privacy Logic suggests in the installation instructions. I really liked the functionality of this device and it’s a good solution. Plus, all Privacy Logic products are made in the USA.

The second product we’ll take a look at in the permanent category is the SecureAview Peephole Cover, which is a pendulum style cover that mounts with one screw above the peephole.

Peephole Covers 05

This was a bit simpler to mount than the Privacy Logic permanent solution, but I don’t care for the fact that the spacers it comes with don’t allow you to adjust the tension that the cover has. This causes it to swing unnecessarily when you let it go. It also makes quite a bit of noise when opening and closing the door due to the swinging. I’m sure this could all be fixed by simply having a thin rubber washer added between the cover and the metal washer.

Peephole Covers 06

Peephole Covers 07

What I also didn’t care for, was that because the device doesn’t sit flush against the peephole, there’s visible light that could be seen by someone with a reverse peephole viewer. The only reason I mention this is movement on the other side of the door could be detected by the viewable light.

I do think the all-metal construction is great on the SecureAview product and I really like the attention to detail of including a matching adhesive cover to apply over the screw during installation. To learn more or pick up a peephole cover from SecureAview, click here.

Notes

A great tip that the SecureAview website shared was to ensure your existing peephole is assembled with a little blue loctite (non-permanent) so that it can’t be unscrewed from the outside. They also mention that some people squirt toothpaste in peepholes at a hotel, so as a last resort, you could always do that. Also ensure you check the peephole of any hotel room if it has one and make sure it hasn’t been reversed by the last comedic guest.

Peephole Covers 04

While protecting your privacy by covering your peephole might not be on the forefront of your security plan, hopefully you’ve learned a bit from this article about why you should take it seriously.

Posted in Physical Security | Tagged , , , , , , , , , | 20 Comments

Learn How To Sew Loop Velcro on Anything with this DIY Tutorial

DIY Loop Velcro Pack

Odds are you’ve seen a lot of Velcro hook and loop on a variety of things from garments, bags, hats, morale patches and even vehicle accessories. Hook and loop makes it easier for us to attach our patches or pouches to other products for any multitude of needs. Sometimes products only come with the hook side of the attachment system, leaving us unable to attach a patch or accessory to someplace where we want or need it.

Today I’m going to share a new product we’re offering on ITS and show you how easy it is to add it to just about anything. You can now get 2-packs of 4″ x 6″ pieces of DIY Loop Velcro in Foliage, Coyote Brown, Black and MultiCam from our online store. As you’ll see from the pictures and video below, you can easily attach a custom-sized piece of loop to your favorite things.

Sewing the loop is easy with a machine or by hand, but in my demonstration I’ll teach you how to sew it on by hand if you’re not familiar with how to do that. If you use small, tight stitches with a color of thread that coordinates with the loop, it will help attach it with minimal visibility and help your project to have a more professional look.

DIY Loop Attachment

Your first steps will be determining what you want to add Velcro loop to and which color of loop will work best with your project. Next, you’ll need a color of thread that closely matches the color of loop (what I’ve used is listed below.) You may find that you need to cut the loop to fit a smaller area than the 4″ x 6″ size that it comes in. You can easily cut it to your desired shape with sharp scissors or a rotary cutter. It’s worthwhile to note that the sharper cut you can make the cleaner your edge will be.

DIY Loop Velcro 03

The loop can be stitched as is right out of the package (as shown in the MultiCam sample above) or you can fuse the edges by briefly running the flame from a lighter around all sides of the loop (shown in the Foliage, Coyote and Black samples). Make sure you don’t hold the lighter in one place too long or you’ll melt the loop causing it to darken in color and curl up.

DIY Loop Velcro 10

If you’re adding the loop to a lightweight material such as a t-shirt knit or sweater knit fabric, consider using a smaller needle size than you would if you’re stitching on nylon or a heavier fabric. The smaller the needle size, the smaller the hole will be in whatever material you’re stitching the loop to. With that in mind, the eye of your needle will need to be large enough to support the diameter of your thread. I recommend using a heavy duty thread, since pulling the thread through the nylon loop will most likely create enough friction to break finer threads.

DIY Loop Velcro 06

Supplies I used for my projects and demonstrations:

  • 4″ x 6″ strips of Velcro Loop in Black, Coyote Brown, Foliage and MultiCam
  • Ruler, coffee cup for measuring a circle, sharp scissors, Rotary Cutter
  • Coats & Clark Dual Duty XP 100% Polyester, Color 900 for attaching Black Loop
  • Gutermann 100% Polyester, Color 542 for attaching Coyote Brown Loop
  • Coats & Clark Outdoor 100% Polyester, Color 770 for attaching Foliage Loop (this was the closest color match I could find)
  • Coats & Clark Dual Duty XP 100% Polyester, Color 8450 for attaching MultiCam Loop
  • Dritz Sharps for General Use, Size 5 (20 needles varying in size per pack)
  • Thimble

DIY Loop Velcro 05

To sew the Loop onto your project by hand, thread your needle and then knot the tail end of your thread. After that, simply use small, close-running stitches near the edge of the loop all the way around. Once you’ve made it all the way around your loop you’ll need to secure the thread with a knot on the back side of the fabric and trim the tail. When looking at the diagram of the running stitch, please note that this is what your stitches should look like from the back side (or wrong side) of the project. You’ll want to keep the stitches on the front (or right side) as small in length as possible so they aren’t visible.

DIY Loop Velcro 04

Lessons Learned

Adding loop to the front flap on my nylon bag was the most difficult project to complete because of how dense the construction of the bag was. I had to stitch through the layer of outer nylon fabric, a vinyl lining on the inside of the bag and more loop attached to the vinyl which is used to keep the bag closed.

DIY Loop Velcro 07

I realized during my first attempt at stitching through the nylon bag that using a long piece of thread made the process more cumbersome. The longer the thread, even though it was a heavy duty thread, the more it tangled and knotted up it became as I pulled the thread through all of the layers. After breaking my thread twice and seeing how messy my stitches were turning out, I pulled out all of my stitches and began again with shorter lengths of thread.

This allowed me to control the twist that naturally occurred in the thread as I slowly pulled it through the bag and the Velcro loop, which kept the thread from knotting or fraying as I stitched.

It was also helpful to have the hard surface of a work table to push the back of the needle down on while I was stitching through the thicker parts of the bag. The thimble was helpful, but having a solid surface to push against made some of the stitching even easier.

Show Some Flair

Throughout the year there are places I visit where I would love to show off an ITS patch or the patch of whatever company I want to show support for. For example, when we’re at SHOT Show I’d love to wear a long sleeve shirt or lightweight jacket with a place to show off my ITS Ladies Patch. Until now, I’ve needed to carry a bag that allowed me to do that.

DIY Loop Velcro 11

Last year I purchased the nylon bag used in the demonstration from Timbuk2, which has their logo stitched on the front flap. I immediately wanted to cover this logo up. Adding a small amount of Velcro loop to the bag, as well as the lightweight Patagonia jacket shown above, instantly helped me to personalize them and show off some flair. I can now add a patch when I want to wear one, but both items also look good without anything showing but the Loop.

The only question left for me now is what else can I add some loop to? Grab your 2-pack of DIY Loop Velcro and get creative!

Posted in DIY | Tagged , , , , | 25 Comments

Trident K9 Warriors: An interview with Former Navy SEAL Mike Ritland

I recently had the unique opportunity to visit Cooper, TX and interview Mike Ritland, a former Navy SEAL and founder of the Warrior Dog Foundation and Trikos International. Mike was one of my instructors at BUD/s when I was in the brown-shirt rollback program after being injured and it’s been great to reconnect with him to learn all about what he’s up to these days.

Since leaving the Navy, Mike has founded the Warrior Dog Foundation, an organization set up to provide a sanctuary for retired SOF working dogs; established Trikos International, which provides personal protection dogs to individuals needing security and Trikos Tactical, where Mike provides working dogs, training, etc. to Military, Law Enforcement and government agencies. He’s also written a phenomenal book called Trident K9 Warriors, that gives us an inside look at the elite K9s the SEALs operate with. Needless to say, he’s been busy!

“Since militaries have existed, man has used dogs to augment them in combat.”

In the interview below, Mike goes into further detail about his organizations, talks about the history of military working dogs and how the mission has changed since working dogs first entered the scene for the US Military in Vietnam as sentries and scouts. Today’s MPCs (Multi-Purpose Canines) are doing more than ever for today’s forces and are widely used throughout all branches of service in nearly any capacity imaginable, with the exception of diving.

How Can You Help?

What’s important to understand about the Warrior Dog Foundation is that it was founded first and foremost to be there for retired Military Working Dogs in any capacity. As Mike mentioned in the interview, most dogs they receive will never be adopted out due to injuries or their temperament and the WDF is there to provide a sanctuary for them in their golden years. While some do get adopted out to good homes, their list is years long at this point.

Trident K9 Warriors 02

Trident K9 Warriors 03

Adopting a Military Working Dog has been made simpler since 2000, when the government stopped treating retired working dogs as military property and allowed for civilian adoptions. The Military Working Dog Adoptions Website is one we’ve mentioned before on ITS and a great resource for learning where to start. While active duty, Military Working Dogs are still treated like property but leaps and bounds have been made with the program since Vietnam. They’re now being given the recognition they deserve and from a medical stand point, being given equal treatment when it comes to being medevaced, rehabbed and cared for.

Trident K9 Warriors 05

Trident K9 Warriors 06

How you can help the Warrior Dog Foundation is to first head over to their Website to learn more. Donations are extremely helpful and don’t necessarily need to be monetary. Mike mentioned being appreciative of any kind of donation, from treats, balls or even donated medical supplies from Veterinarians.

Trident K9 Warriors 07

Trident K9 Warriors 09

Trident K9 Warriors 08

You can also purchase Mike’s book, Trident K9 Warriors, where a portion of the proceeds will go directly to the Warrior Dog Foundation. He has a new book hitting the shelves in October and is also working on an additional training book.

I’d like to thank Mike for his time and allowing us to to get a behind the scenes look at the great work he’s doing with the Warrior Dog Foundation and Trikos. Bringing awareness to the public about working dogs and ensuring these programs continue to evolve and grow in the right way, is an extremely worthy cause and one I’m proud to support with any resource available to me.

Posted in K9 | Tagged , , , , , , , , , , , | 7 Comments

U.S. Spies: The Intelligence Cycle from Delivery to Consumption

2 of 3 in the series U.S. Spies

When I first considered entering the intelligence community (“IC”), the notion of classic Cold War-style cloak and dagger espionage was enthralling. Good guys versus the bad guys; the brutal hand of the USSR versus the liberating forces of the United States and democracy. Scenes of car chases, meetings in safe houses, or exchanging coded messages in city parks, coffee shops, or in passing on a busy sidewalk were the dreams of intelligence operations that I envisioned.

But a few pieces of the puzzle were missing, pieces that will be explored in this article.

As mentioned in Part 1 of this series, there is a difference between information and intelligence, as well as a process (or a cycle, as it is referred to) by which intelligence is delivered from the source, analyzed and passed to the customer for consumption. This process varies from agency to agency but is most commonly referred to as the TCPED*, or intelligence cycle.

The purpose of this article is to introduce this cycle, as well as to highlight the most critical aspect of intelligence as a function in regards to providing useful information to customers: analysis.

The Intelligence Cycle

TCPED is the cycle through which timely, accurate and relevant information is made useful and available to consumers and operations.

T – Tasking
C – Collection
P – Processing
E – Exploitation
D – Dissemination

TCPED outlines the general pipeline through which information passes via the various entities within the IC. While each of these steps occur virtually simultaneously and across the entire spectrum of strategic/national, operational and tactical levels of the IC, the general cycle remains identical for practical purposes.

For the sake of time management and everyone’s sanity, the individual steps of the TCPED process will not be explored in this article (possibly at a later time). The most important thing to note is that it is a continuous, dynamic and massive scope of activity that requires constant administrative, operational and resource-intensive focus across all levels of the IC.

So what then in the intelligence cycle is most important for the IC in providing timely, accurate and relevant information to consumers? Well here’s a hint — it’s only implicitly mentioned in the TCPED cycle: analysis. Just as the intelligence cycle is a continuous, dynamic and massive activity that requires constant oversight and management by the IC, analysis is just as omni-present and equally as important.

Military Intelligence

Analysis

Analysis is to intelligence as oxygen or blood is to life. Without it, consumers are left only with raw information or facts, depleted of perspective, insight or purpose. As paraphrased by Miriam-Webster, analysis is the process of breaking down a complex issue or matter into smaller parts or components in the hope of gaining a better understanding of the issue.

In the context of intelligence operations, analysis is the process of taking often incomplete, missing or complex information and breaking it down into a product that provides unique and valuable insight (which is also timely, accurate and relevant if done correctly) to the customers.

Scenario

To highlight the importance of analysis, let’s say you are planning a hiking trip to the mountains and are told prior to leaving to research the weather**. You enter the word “weather” into Google (without having any local or personalized settings set) and are told the sky will be blue and clear, nothing further. At this point, you have information without analysis — just raw facts. You have no context, no perspective and the information really has no value because it has not been broken down or processed in a form that fits the context of your hiking trip.

Contrarily, let’s say some analysis was performed, and compare the results. More research was conducted, given context, and tailored to your hiking trip specifically. Where is the trip taking place? Where will you move from your starting point? What altitude will you be hiking at? What historical weather data for the location is available? Have any hikers hiked in the same location at the same timeframe in the past? These are just a sample of the questions that would need to be asked in order to analyze what the weather will most likely be for your hiking trip. Sounds simple, right? Look into the past, find any relevant historical data, and apply some context in order to make it relevant to your situation. Well, almost. Let’s look at a strategic example.

Global Hawk image

What happens when the situation and environment become more complex? Instead of the weather, you’re trying to determine when one leader of an aggressive country is going to decide to order his military to assault its neighbor in order to seize its abundant supply of natural resources. Well, we cannot read minds yet or this problem would be easy.

What we can do is watch everything else: the leader’s movements, the position, activity, and movement of various units the leader may use to conduct an assault, monitor any weapon systems that could be used during or prior to an assault, or maybe assess which other key events may provide policymakers with some forewarning of hostile action. But how do you assess what you’re seeing is forewarning of an attack? You need a baseline. Which means you’d need to be monitoring this country and its activity well before you believed the leader had any intent to invade his neighbor. You must establish what is normal before it becomes abnormal. So the plot thickens.

Informed Decisions

Without intelligence, and specifically analysis of available information, none of this would be possible. There would be no baseline, because no one ever thought to establish one, because no one possessed any context or perspective of that country or region. Even if all of the above information was known, analysis is still required. What historical precedence or trends are available? What other information regarding the leader or his country is available, and how can it be applied to the current situation? Context, perspective, and insight relative to the situation is still required in order to even begin to properly assess the hostile leader’s possible actions.

Intelligence Community

It should be obvious (hopefully not too much so at this point) the role that analysis — and professional analysts — play in the intelligence cycle and IC. Without analysis or trained human analysts to process intelligence, there is only raw information. Context, perspective and an application of what is known must be applied to the situation in order to begin to understand that which is unknown.

It is the complexity and dynamic nature of world events that ensures intelligence analysts are never short of work. Without them, it would be impossible to sift through the ambiguous, conflicting, or missing pieces of the puzzle that policymakers require in order to make the correct, informed decisions.

In order to address various scenarios like this every day and to provide timely, accurate, and relevant intelligence to US policymakers, there are a number of analytical techniques that can be employed by analysts during the TCPED cycle. A few of them can be found below.

Analysis is the bread and butter that allows analysts to turn raw information into timely, relevant, and accurate intelligence — intelligence that has been properly applied and contextualized throughout the TCPED cycle. It is a critical component of what the IC does, and is performed in order to assist policymakers, enable operations, and to ultimately ensure the survival and safety of the United States.

Footnotes

  • *TCPED is most commonly applied to Intelligence, Surveillance, and Reconnaissance arena but can be applied to the scope of general intelligence operations as well.
  • **The weather example is somewhat ironic because weather forecasts are a product of analysis themselves, based on trends and most likely courses of action of atmospheric conditions, etc.
  • ***This document provides an excellent primer on intelligence analytical techniques: [pdf]

Editor-in-Chief’s Note: Oscar M. is a Junior Active-Duty Intelligence Officer supporting a conventional airborne-capable unit. “My goal is to serve by protecting the US Constitution, keep the bad guys of the world at bay, fighting them when necessary and ensuring that the American people don’t have to.”

Posted in Tradecraft | Tagged , , , , , , , , , | 5 Comments

Fog of War: How Would You Respond to an IED Detonation?

In light of recent events, I’d like to go over my suggestions for the medical response to an improvised explosive device explosion. As we’ve seen during the past ten years of fighting overseas and recently here in Boston, IED’s are the bad guy’s weapon of choice.

Let’s not forget that this isn’t the first attempt to detonate a bomb in CONUS, but hopefully it will be the last. First of all, I just want to take my hat off to the response to the  attack on Boston. It truly was a best outcome of a horrible terrorist attack on our county. But why did it go in our favor?

The nature of a 26 mile race makes it a softer target. How can you secure that much real-estate in a major city? Anyone who has competed in a marathon knows the number of EMS personal that are used. Having worked major sporting events as a police officer, I know that they pull in every available body they can. You had EMS, local RN’s and doctors all there and ready to help. So what can everyone else do if they are in that situation? Continue reading

Posted in Medical | Tagged , , , , , , , , , , , , | 25 Comments

Sugru Self-Setting Rubber for Your Next DIY Project: The Future Needs Fixing

Sugru is an interesting product that I’ve known about for a few years now, but it wasn’t until recently that I picked some up during a past offering on Huckberry and started putting it to use.

Sugru 03

Since purchasing an 8-pack of Sugru, which contains 4 individually wrapped packs of black Sugru and 4 white, I’ve rigged up a hook on my monitor to hold my headphones, fixed a coffee cup handle that broke when I dropped it and experimented with using it for grip improvement on medical shears and even hiking poles.

Sugru

Sugru is a self-setting rubber that will bond to aluminum, steel, ceramics, glass, wood and even some fabrics and plastics. Think of it as silly putty that you can hand-form into anything you want; permanently. It will cure fully in about 24 hours at room temperature and leave you with a tough (but still flexible) silicone-rubber that’s UV resistant, electrically insulating, waterproof, dishwasher safe and can withstand temperature up to 356F and down to -58F.

Sugru 01

Sugru 02

Sugru suggests that surfaces are clean, dry and free of dust/grease before applying. They also mention in the fine print that they don’t recommend hanging heavy objects with it and to pay attention to the use by date printed on each individual package.

So far, I’ve been using the coffee cup you see above with a full cup of coffee and it’s holding up perfectly. So is the hook on my monitor that holds my headphones. I’ve yet to have a failure with the ways I’ve used Sugru, but I also haven’t used it in as many applications as Sugru mentions it can be used in.

Suggested usage ideas from Sugru:

  • Add protective bumpers to your phone
  • Improve a saucepan handle
  • Add custom grips to ski poles
  • Cover fraying cables
  • Replace buttons on car key fob for an increase in tactile feel
  • Make your shoes more comfy
  • Patch holes in walking boots

The possibilities are truly endless for what Sugru might be able to do for you and your next project. Additionally, I also put together a video showing Sugru in use and how I’ve been able to use it.

If you’ve had experience with Sugru, how have you used it? If not, what are the ways that you could envision using it? I’d love to hear from you in a comment below.

Also, if you can spare a few minutes, the story and timeline of Sugru as a company is an amazing tale and one I really loved reading about. While you’re there, you can also purchase Sugru directly in a variety of offerings.

Posted in DIY | Tagged , , , , , , | 12 Comments

All Orders Placed in the ITS Store Receive a Free Carry The Load Morale Patch (While Supplies Last)

We wound up with some extra Carry The Load Morale Patches that we had made up for this year’s event and we’re giving you one FREE with each  ITS Store order placed now through Sunday while supplies last! We’re more than likely not going to be able to accommodate every order, but if we’ve still got them and you place an order, you’ll receive one for free. (One per customer)

ITS Carry The Load Morale Patch 01

Place your order in the ITS Store to grab your free Carry The Load Patch!

ITS Entry Cards

We’ve also just released our popular Entry Cards in Stainless. The Titanium version isn’t going anywhere, they’re just harder to keep in stock and now we’ve got an alternative that’s half the price of Titanium. Each Entry Card comes with a protective sleeve and is credit card sized to store easily in your wallet or even a survival kit tin.

ITS Stainless Steel Entry Card 01 ITS Stainless Steel Entry Card 02

Check out more details and purchase yours here!

Posted in ITS Information | Tagged , , , | 2 Comments

The American Manifesto

I am a sovereign man, responsible for my own actions and their consequences. I am the supreme authority of my life, and I may do with it as I please. I hold this to be an inalienable right of my humanity, and I will not suffer it to be infringed upon.

I wish to assume the calculated risk, to wager my livelihood and well-being upon the decisions I make; I desire to test my skill and intelligence against all form and fashion of challenges. Danger is the spice and variety of life: all danger is simply risk, and I weigh the risks and pursue those that offer the highest return; whether that return be material gain, spiritual enlightenment, temporal pleasure or simply the euphoria of success.

I will neither ask for nor receive unearned handouts; I will trade value for value. I will work for what I own, and I will own what I work for. I abhor debt, considering it as merely a front for economic slavery. I do believe in the principles of capitalism, where one is rewarded according to his ability and productivity. I make money, not just gather it: producing products and services of value, squaring off against my competitors in an effort to win.

I am fiercely competitive, and proud of my country and myself. I strive to be the best I can be, not by pulling other people down and restraining them, but by striving to outdo them, to better them at every opportunity. I will not apologize for my ability, nor will I cower before any foe; I resolutely embrace my skills and intelligence, and use them to my best profit. It is my right to be uncommon, to walk the path less traveled by. I hold that if everyone were to work for their best interests while refraining from infringing upon others, then the competition would drive quality up and price down: that we would raise each other up, instead of pull each other down.

I choose my friends and company from among my betters, constantly seeking to improve myself. I maintain an inviolate sense of honor, my word is my bond: I deal with people in a straightforward way, expressing the truth, with tact, in all I do and say. I communicate precisely and simply, speaking and writing what I mean to convey exactly.

I neither impose my will upon others, nor do I forcefully oppose their will; if I choose to attempt to convert someone to my point of view, I use logos, swaying them through reason and immovable logic. I will readily yield to another point of view, maintaining an open mind, provided I am convinced through the use of persuasion that the other party is correct. I refuse to coerce or be coerced.

As the logical result of my economic and moral conscience, I believe in living under my means and preparing for a rainy day. I fix things myself. I become the master of my possessions, learning their inner workings and using them to best effect, not to be held in their thrall. I buy things of superlative quality, both for the item’s intrinsic value and because something made to such a high standard shows a mind and mentality such as mine.

I am always a student. I enjoy studying the literary works of great acclaim, apprenticing under the tutelage of a master in his trade, and exposing myself to fresh experiences. This does not mean I accept everything I come to understand, I apply myself to think critically and skeptically of all new material: keeping the grain and letting the wind blow the chaff away. I do not limit myself to any particular trade or subject, but seek out and delve into diverse topics.

Being responsible for my own fate, I do not deign to leave it in other people’s hands. I take it upon myself to acquire skills and knowledge that I can use to defend myself and those I love, and to give myself as much of an advantage in any situation as I can. I maintain a high level of awareness, both of my surroundings and myself. I respond decisively and with no apology to defend myself, my possessions or the lives of others.

I dress immaculately. I present myself with composed confidence, sure in myself, certain in my choices. I am tactful and good company, not to curry favor with others, but because anything less would be disgraceful and below the level at which I hold myself. When the time to work comes, I wear clothes whose form is expressed in flawless function.

I do not dwell on that which is outside my control. I accept it and adjust accordingly: I am permanently flexible and perpetually stoic. I am the master of my fate; I am the captain of my soul.

I consider religion a personal matter. Whatever I believe, I separate it from my politics and my judgment of others.

I voluntarily surrender a measure of my authority over myself to my government, which I hold to exist for the sole purpose of removing coercion as a viable means to achieve an end. I participate actively in the politics of my land, not as a method to raise myself above my peers or achieve a position of power, but to serve. I consider political service a necessary duty, not a career; I regard a large, intrusive government to be the greatest of all evils, because all that is required for it to succeed is for good men to do nothing. For this reason, I am a proponent of citizens being free to arm themselves, as they ought: the point of arming the populace is not pleasurable pastimes nor is it individual protection, the point is to empower the people. If the people have less force available to them than the government, then the government is free to coerce them. At that point, they are no longer citizens, they are now subjects.

I am an American. I own my life, the product of my labor and my mind. With these, I will contend with fate. I will not trade my freedom for a guaranteed existence. I am, therefore I think.

Editor-in-Chief’s Note:  Please join us in welcoming Wesley B. as a contributor on ITS Tactical. Wesley enjoys working with his hands and has spent the last 8 years in construction. He also enjoys working out and training.  We are proud to have met Wesley when he attended the Inaugural ITS Tactical Muster.

Posted in Mindset | Tagged , , , , | 59 Comments

U.S. Spies: Understanding the World’s Second Oldest Profession

1 of 3 in the series U.S. Spies

I’m often asked what I do and I feel obligated to respond, “I could tell you, but then I’d have to kill you.” When people mention intelligence professionals, they always seem to be describing CIA Agents for some reason. However, it just so happens that I carry a silenced weapon with me daily, but only in an expensive, tailored suit while driving my Aston Martin. The list of pop culture references goes on.

Not surprisingly, many people have misunderstandings regarding intelligence organizations or the Intelligence Community (referred to as the “IC”). The purpose of this article is to clarify some of these misconceptions and to briefly discuss what intelligence support at the national and tactical levels entail, by providing a framework of understanding.

The information contained here will by no means be all-encompassing and only scratches the surface of what the IC is capable of. We’ll also discuss operations and the notion of intelligence organizations as a whole without violating any OPSEC.

Intelligence vs. Information

In this article, the terms intelligence and information will be used almost interchangeably, although there’s a critical distinction.

Here’s the critical concept: all intelligence is information, but not all information is intelligence.

Meaning, that if it hasn’t been analyzed, processed, or exploited in some form, information is not intelligence. That’s the function of intelligence organizations — to task, collect, process, exploit and disseminate information that then becomes useful due to its timeliness, accuracy and relevancy to whatever operation it’s in regards to (and is because of this process now deemed classified information).

At the top level of the US intelligence apparatus is the IC. The IC is a massive entity* that comprises all of the national-level, DoD-related and other intelligence organizations that form our nation’s intelligence-sharing community. This would include the CIA, FBI, INR, NRO, NGA, DIA, AFISRA, ONI, USMCIA and many more.

Intelligence Community Structure

All of these organizations fall under the Office of the Director of National Intelligence, whose responsibility is to coordinate, manage, and oversee the massive tasking, collection, processing, exploitation and ultimately the most important — dissemination of timely, accurate, relevant, analyzed information at the strategic level, also known as intelligence. Chief among the concept of the IC is information sharing. In a post-9/11 world, ensuring that the countless intelligence entities are sharing their information rather than keeping it to themselves is paramount.

Operational Support

Often there is a distinction placed between support entities and operational entities, especially in the military and at the tactical level. The same holds true for the IC and all intelligence organizations. Often intelligence units are considered a separate entity from their operational or policy-making counterparts, much like the legislative branch is separate from the executive branch. There are the decision-makers and agencies that execute the law, and then there are those that support it and create it. Not a perfect comparison, but close enough.

President Lyndon B. Johnson in the Situation Room

This stems from the concept that intelligence is a support function, one that provides the necessary information to the operations units and decision-makers, who can then execute the appropriate actions to act on the information that the intelligence organizations provide. It is a continuous cycle — policies and operations produce intelligence, which then enables more actionable operations and policies, etc.

At the tactical level, intelligence entities can be embedded in operational units in order to fuse the intelligence capabilities with the needs of their operations counterparts. In the IC, this relationship is defined by using terms such as the “customer”. The IC works to create “products” (exploited and analyzed information that is timely, accurate, relevant, etc) that are provided to various “customers” who need certain information for their work.

At the strategic level, this may be an in-depth report on the intent and structure of a new terrorist organization and the scope of their activity as it pertains to international politics. At the tactical level, this may be a trend analysis of various threats to friendly forces at a FOB in Afghanistan based on the TTPs (tactics, techniques, and procedures) of known insurgents, to include weapons used, possible times for an impending attack, the location and even specific individuals involved.

The Intelligence Community

Intelligence is a very broad but capable function. The support that it provides to operational units is critical and cannot be replaced or performed by any other function. Functionally, it provides national level decision-makers with insight to the thoughts and pending decisions of other world leaders, monitors the enforcement of treaties, provides indications and warnings of pending attacks at the national, operational and tactical levels, offers trend analysis for threat reporting, delivers analysis regarding current events, shapes commanders’ understanding of the environment and environmental effects and ultimately is the enabler that allows operations and missions to be conducted successfully.

Access to the world of the IC is highly restricted and requires a security clearance, a need-to-know and the signing of [multiple] non-disclosure agreements. But once secured, this access is a vast wealth of information that can be tailored to the needs of the customers, and is mission-critical in today’s day and age. Intelligence is the world’s second-oldest profession and for a good reason. It’s a privilege to work with and understand the intelligence function in such a dynamic world.

CIA Library

Footnotes

  • *While the concept of information sharing among intelligence entities was full of well intent, an entire book could be written on the bureaucratically ridiculous problems inherent in attempting to facilitate the coordination of terabytes’ worth of daily information exchange between government agencies. This article by Nada Bakos summarizes a recent issue quite well.

Editor-in-Chief’s Note: Please join us in welcoming Oscar M. as a contributor on ITS Tactical. He’s a Junior Active-Duty Intelligence Officer supporting a conventional airborne-capable unit. “My goal is to serve by protecting the US Constitution, keep the bad guys of the world at bay, fighting them when necessary and ensuring that the American people don’t have to.”

Posted in Tradecraft | Tagged , , , , , , , , , | 14 Comments