Chinese Intelligence Fronts Using LinkedIn to Recruit Spies

The U.S. counter-intelligence chief William Evanina has alleged that American-based company LinkedIn is currently at the center of a Chinese spy recruiting effort aimed at thousands of individuals holding positions that may grant access to government and commercial trade secrets. Paul Rockwell, the head of Trust and Safety at LinkedIn has confirmed to Reuter's that … Continue reading Chinese Intelligence Fronts Using LinkedIn to Recruit Spies

Stealth: 5 Fundamental Ground Techniques in Continuous Movement

Like any other skillset that blooms out of a core set of physical movements, training for stealth requires drill and conditioning. It is one thing to master a single stealth technique, such as a low-crawl or hand-assist crouch, but it is quite another to pull a combination of movements together into a seamless tapestry of … Continue reading Stealth: 5 Fundamental Ground Techniques in Continuous Movement

Identifying Elicitation: Security Awareness

Elicitation is a means of acquiring information about a target by exploiting weaknesses in human psychology and a cultural proclivity to respond to questions of strangers in a friendly manner. It may be considered an art to elicit sensitive information from an individual. Be aware of this method of drawing out details about critical assets … Continue reading Identifying Elicitation: Security Awareness

Terrorism Case Study: Farooque Ahmed

On October 27th, 2010 a Muslim named Farooque Ahmed was arrested for attempting to provide material support to the international terrorism organization known as al-Qa'ida. Ahmed plead guilty to the charges and was subsequently sentenced to 23 years in prison. Ahmed was/is a naturalized citizen from Pakistan who came under the watch of the FBI following … Continue reading Terrorism Case Study: Farooque Ahmed

Ninjutsu is Terrorism: Why this Path Requires Caution

Authors Note: "This piece should not be interpreted as an endorsement of terrorism in any way. The intent is to draw similarities between ninjutsu and terrorism for educational purposes." See Legal Ramifications of Attaining Skill in Ninjutsu for more info. "Our challenge is to get through and to know where and how to hide, leaving … Continue reading Ninjutsu is Terrorism: Why this Path Requires Caution

Infiltration Exercise: Bridge Crossing

I don't like going to gyms to exercise. Preferably, I would like to earn my abilities out in relative "nature". Now, climbing bridges is great exercise, and there are variances in body movement that can be used to cross them that can translate to climbing skill for other urban obstacles. For instance there is the: … Continue reading Infiltration Exercise: Bridge Crossing

The Sock Method: Stealth Movement and a Critique of Modern Footwear

Let's face it, infiltration can be hard. Especially without the proper footwear. If you are infiltrating a target area, or simply needing to sneak up on someone, chances are you will be relying on a calculated placement of each step in combination with awareness of the potentials for noise of a given terrain. Ideally, no … Continue reading The Sock Method: Stealth Movement and a Critique of Modern Footwear

Innin-jutsu Training: How Geocaching is a Tool to Developing this Skill

Geocaching is an activity that involves searching via GPS for a 'cache' placed by anonymous other persons (geocachers). The caches range in size, shape, and contents and even for the casual participant a certain amount of secrecy and discretion must be exercised when approaching a cache to prevent 'unauthorized' access and knowledge of the cache … Continue reading Innin-jutsu Training: How Geocaching is a Tool to Developing this Skill