In this episode, we discuss intelligence gathering with Sam of Forward Observer Magazine. He shares techniques so you can know what’s going on before the news.
Threat Intelligence Gathering Episode Topics:
- How did Sam come to preparedness
- What is threat intelligence for generating personal early warning systems
- What is Operation Urban Charger
- How preppers can develop early warning for SHTF
- Can you use these systems to be on top of riots and other disasters
- How much of an early warning can preppers get by using these methods
- What are the two big intelligence problems people experience that slows them down
- How do we solve analysis paralysis
- How to do social media and other open source intelligence sources
- What is Sam’s go to rifle
Quick episode takeaway:
If you had to give an elevator pitch for your book, SHTF Intelligence: An Intelligence Analyst’s Guide to Community Security, what would it be?
In an SHTF senario, we’re all going to run into two problems. Number one, we’re going to not have enough information to make well informed time sensitive decisions: an intellegence gathering deficiancy. Or, number two, we going to have way too much information–we’re going to be drowning information. And that’s going to slow down our decision making process.
So through intelligence gathering techniques […] we essentially solve both of those problems before we encounter them.
To solve the first issue, of not having enough information, I talk about intelligence collection and how to get it automated. I talk about human intelligence gathering, and imagery and open source signals intelligence gathering; all the things we need to set up now so that we can begin getting these intelligence streams coming into what we call the A.C.E. (Analysis and Control Element). […] So setting up those information gathering mechanisms now to solve the first problem.
Now to solve the second problem […] I talk about analysis and how we separate the wheat from the chaff. How we coordinate potentially massive amounts of information and make it relevant [and] ensure that it’s timely. […]
The last part of the book is about how to set up an intelligence element: The roles, the tasks, and the responsibilities–what everyone does so that at zero hours we know […] this is what everyone does and this is how we fill this giant blind spot when it comes to threat information gathering.