Thursday, March 12, 2020


Although it won’t be posted until Monday, I am writing this on Friday, 6MAR2020 (fair warning, any numbers will probably be wrong by the time you read them).  
I’ve never—in almost a decade of writing the Mountain Guerrilla Blog—jumped on the worry wagon. I was one of those who pointed out—accurately—that Jade Helm was simply a typical training exercise. I’m the guy who pointed out—in books, for posterity, no less—that seeing armored vehicles and tanks transported CONUS, on rail cars, is not a sign of coming martial law, but is simply the way the military transports shit stateside. I’m hardly a model of prepper paranoia.
So, when I say that I’m concerned—not scared, not worried, but concerned—about COVID-19, there must be a reason, right?  
Sources and Methods
Sources and methods is a term used to describe the process of intelligence collection and analysis. Intelligence information sources and the nature of the information gathered can vary. Sources are the sources from which we get the information. Methods are the tradecraft utilized to procure that information.  
Sources can be other people, which would be referred to as Human Intelligence, or HUMINT. Information collected from photographs, such as satellite overheads, is referred to as imagery intelligence, or IMINT. There’s also signals intelligence, or SIGINT, such as eavesdropping on phone calls, and etc.  
Here’s the thing though...much like the Enigma Project, during WW2, if the opposition learns who/what your sources are, they can stop that flow of information, or worse, they can utilize disinformation, feeding you bad information through those sources. The opposition—or even friendly allies that you need to keep tabs on—can determine sources through a number of methods.  
In some cases, taking advantage of your intelligence collection efforts to stop an attack, or to hit a specific target at a specific time, can be a clue that you intercepted communications (Enigma’s biggest issue was, once we had the Enigma machine, a lot of times, taking advantage of the information collected would have revealed that we had the machine, leading to a loss of that asset).  

No comments: