Uploaded by rudolph.chad

community-security-toolkit-space-analysis

advertisement
COMMUNITY SECURITY TOOLKIT: SPACE ANALYSIS
Posted by Sam Culper / Mike Shelby | Sep 25, 2019 | Intelligence, Sam Culper | 3  |     
During my last tour in Afghanistan, Palantir was quickly becoming the sweetheart analysis software suite of the Army and
Marine Corps. Before I deployed, I sat through a class o ered by the company, and immediately recognized that it’s great
software. Intelligently designed, easy to use, top notch functionality, and categorization options allow an end-user to drill
down and really dissect the adversary and surrounding events. It is, however, only as powerful as the end-user allows it to
be.
By the time I left the Intelligence Community, I had become disillusioned with the state of the average analyst (though not
every analyst) and much of leadership which was more interested in developing the latest technology instead developing the
minds of their analysts.
Intelligence analysis is, and likely will be for decades to come, 80% investigation and 20% technology; but tools like Palantir
are trying to invert that ratio. Without a highly inquisitive mind motivated to nd the solutions to unanswered or seemingly
unanswerable questions, and the proper analytical methods to pick apart your adversary, your analysis of information of
intelligence value will be found wanting. Still, for all the faults of technology, Palantir made SPACE analysis way easier.
SPACE is an acronym that every good analyst should use, especially where it concerns community security. Its roots are in
our operational security (OPSEC) manual, and when the adversary doesn’t care enough to implement SPACE into his security
considerations, it’s our job as intelligence analysts to exploit their mistakes. (That road goes both ways, by the way.)
One of the things an analyst should consider of an adversary are his vulnerabilities, which makes OPSEC so important to both
parties. In SPACE, we’re presented with invisible vulnerabilities: indicators that aren’t often considered and don’t appear to be
vulnerabilities at face value, but are useful nonetheless when applied to the enemy’s operating picture.
Keep SPACE in mind when inventorying your own security measures. It may be the case that the analyst assigned to you fails
to consider them. Then again, maybe he doesn’t. And remember: each piece of information from the SPACE method is
cumulative; each on its own isn’t as powerful as when they are all taken into consideration.
Signature
Pro le
Associations
Contrast
Exposure
Signature
Signatures are identi able, unique, and stable to an individual or group of individuals. For instance, a signature is an
encrypted or signed email, or a message from a speci c phone or email address, or a semantic tell – the way we speak or
write, for instance.
These are pieces of a puzzle that can be collected and analyzed to form a better understanding our adversaries (or of
ourselves). A signature is something standardized (or roughly standardized) in the way you operate that may identify you as
being separate from someone else, much like a signature recipe is to a chef. Serial killers have signatures. Gangs and gang
members have signatures. You will never mistake the sound of a monster truck for that of a Toyota Prius, or a dog’s bark for
a cat’s meow. Observed over time, the way you communicate likely presents a signature. A signature may not always be
deliberate, but it’s a calling card that helps an analyst identify a speci c, and perhaps anonymous, individual.
One practical way to identify and record signatures is to look for gang-related tagging and gra ti in an area. Take a photo of
the tag in or around your community, and begin a collection. We can use these photos to identify gangs that may be present
in the area, as well as establish the boundaries of the gang activity. Analyzing the locations of a particular gang’s gra ti or
tagging could help us understand their area of operations or “turf”.
Pro le
Signatures may develop into a pattern of indicators called a pro le. In Afghanistan, a convoy of jingle trucks led and followed
by a couple gun trucks ts the pro le of a supply convoy. (A jingle truck is an ornately decorated Afghan commerce carrier.) No
one would mistake this pro le for that of a U.S. security patrol or raid. In each case, the jingle truck di erentiates itself from
others by its signature, the same as a gun truck would. You’d never mistake a jingle truck for a gun truck; but, added
together, we get the supply convoy pro le.
Another example would be a customer wearing a Dodge baseball cap in a gas station purchasing $150 of diesel fuel. If forced
to guess, would you conclude that he drives a 3/4-ton Dodge pickup or a Toyota Prius? If you stopped at a red light behind a
camou age-painted Ford Ranger with two Browning stickers and a Size Matters deer antler decal, would you expect the
driver to be wearing an Warren 2020 t-shirt and a drinking a Starbucks iced frappachino? No, because his signatures t a
speci c pro le.
When presented with two separate but anonymous individuals — for instance, two di erent gra ti “artists” who belong to
the same gang but have distinct characteristics, or signatures, to their tags — our rst step towards identi cation is to
develop a pro le for each of the gang members. If each of the tags has its own signatures, what can they tell us about ganga liation? Are they the same or di erent gangs? Once we associate a tag with a speci c gang, then we can get a much better
idea as to the threat level the gang poses to our community.
Associations
Associations help adversaries to interpret actions. Good analysis is about identifying indicators and patterns in order to
determine potential courses of action (future events). We ask ourselves, is one event associated to another and, if so, what does
that tell us about the two events? These events could be phone calls, emails, travel patterns – all indicators of activities –
associated with speci c events.
We might identify a pattern of communication before an event, and therefore associate the two. In Iraq, perhaps it’s the case
that when one speci c phone number calls another speci c phone number, there’s a sectarian bombing against the civilian
populace the next day, but only when those two speci c numbers communicate. That communication is an indicator and we
form associations between the phone call and the bombing. The next time we see those two phones light up, maybe we
increase security, harden our xed targets, or kill/capture our target.
So how can we develop associations starting with gang tags? In the Signatures paragraph, I talked about mapping gang tags
to get a general idea of the gang’s area of operations. As long as we have the members of our community documenting and
reporting the locations of these tags, then we should also be speaking with them about who’s responsible for the tagging and
about gang membership in the community. If we can develop streams of reporting, then we can begin associating tags to
individuals, individuals to gangs, and both individuals and gangs to speci c activities. Identifying these previously unknown or
anonymous gang members is the absolute rst step in targeting them or their activities.
Contrast
Just like the contrast on our televisions and computer screens, which ranges from black to white, good analysts observe
contrasts in the battlespace, or for an individual or organization. An example of contrast for an individual is the route to and
from work. If our subject takes the same route every day, but today makes a change by turning onto a di erent road, then
that’s a new contrast. If our subject calls his wife every day after work, but stops making the phone call, then we’ve just
identi ed a new contrast. Those actions beg the question, “Why the change?” These contrasts are red ags for analysts, and
good analysts begin looking for the reason for the change in baseline activity. These deviations should cause us to ask
questions and identify the reasons why there was a change in expected behaviors or patterns.
So what are the expected communications, actions, battle rhythms, or operational tempos from a pro le we’ve developed?
Let’s start by identifying the baseline activities of the gang members (or drug addicts or burglars, etc.) in our community.
How would we describe their baseline behaviors and crimes and activities we expect from them, and with what frequency do
those crimes and activities occur? Once we’ve answered these questions, then we can begin looking for patterns that don’t
match the baseline and identify why there are changes.
Exposure
Exposure consists of three factors: duration, repetition, and timing. Phone calls placed at random iterations, each lasting for
two hours, is an example of duration exposure. The same is said for phone calls that last for ten seconds. The duration of
the phone call is potentially important to us — what conclusions could we draw based on the length of the call?
Next, repetition exposure is observed when a phone call occurs repeatedly. That repetition means something and could
give us clues as to patterns and associations. Finally, those phone calls that occur at 7pm local time are an example of
timing exposure. Why always 7pm? — that’s a question that deserves some attention.
What we’re developing with these three types of exposure is what’s called a pattern of life. These factors of time help us form
associations, perhaps spatial and temporal, so we can begin identifying patterns in an individual or organization’s daily
activities. And once we observe these set patterns, they can be exploited, especially if these patterns lead to predictive
intelligence — that is, being able to predict where an individual will be Wednesday afternoon based on the patterns he’s
previously exhibited.
Back to our gang scenario, how can we identify exposure with gang activity? If there’s a rash of robberies over the period of
two weeks, and then zero robberies for a week, and then another rash of robberies that last two weeks, based on the
patterns of duration, when will the next robberies begin and end? Identifying patterns in duration can help us understand
how the adversary operates, and that’s a critical step in stopping them.
For repetition, we can nd associations in time and date of gang activities. Do gang activities occur every Tuesday, or every 14
days, for example? Just like duration, repetition allows us to develop predictive intelligence, which greatly aids in the targeting
process. The same is said for timing exposure — if these robberies are occurring sporadically or with no identi able
frequency, are there any patterns in the timing of robberies?
Conclusion
Although we just covered ve characteristics of activities that will help us to build a pattern of life for our adversaries, keep in
mind that your adversaries may be building a pattern of life for you.
Do a SPACE Analysis on yourself and identify the patterns you set and how they could be exploited. Humans are creatures of
habit, so be sure to identify the habits or patterns you exhibit.
SPACE Analysis can be used to nd patterns and associations for a multitude of things, not just gang activities. Put it in your
analytic toolbox and apply it to real world situations that a ect your community.
Liked it? Take a second to support us on Patreon!
SHARE THIS:
 Twitter
 Facebook
SHARE:









 RATE:
 PREVIOUS
NEXT 
M1A SHOOT OFF – 6.5 CREEDMOOR VS 308
A MULTI-PURPOSE FIELD TOOL: FENCING PLIERS
ABOUT THE AUTHOR
Sam Culper / Mike Shelby
Samuel Culper / Mike Shelby is a former Intelligence NCO and intelligence contractor. A veteran of Iraq
and Afghanistan, he now researches intelligence and con ict at Forward Observer and teaches at Gray
Zone Activity. You can nd more of his work at https://www.forwardobserver.com and
https://www.grayzoneactivity.com.



RELATED POSTS
China’s Marine Corps: The
Sea Dragons
April 2, 2021
Radio Contra Episode 66:
The Intelligence Targeting
Cycle, Drone Warfare,
Phones, Social Media and
You
. . . ANTIFA: RISE OF THE
BLACK FLAGS . . .
[OUTSTANDING
DOCUMENTARY]
November 1, 2020
Monkey Werx Overwatch
SITREP 12 30 20
December 30, 2020
August 6, 2021
3 COMMENTS
vyt1az on September 25, 2019 at 23:26
Great article To the point at the top about tech like Palantir they’re why I try to avoid certain behaviors
Great article. To the point at the top about tech like Palantir,they re why I try to avoid certain behaviors
and patterns. Automation makes people mentally lazy and sloppy. When algos don’t t a particular
model or pattern, the dum dums in the growing digital “intelligence” world are going to mis-categorize
innocent people instead of using critical thinking.
With that being said, it would be nice to have partially automated data collection for those of us without
the Palantir-level budget. Particularly considering how much time it can take to collect good data on this
kind of stu . I know there are things like crime maps where you can get some incomplete data for a local
area.
I also have to say, it’s nice seeing Sam posting here. His recent YouTube videos are also really well done
and worth a re-post over here.
Greg on September 25, 2019 at 19:29
Excellent!
Reading through that, it’s easy to see how High Tech and our Government are using tose very techniques
against this population. Sometimes together…
Matt in Oklahoma on September 25, 2019 at 10:55
Now if only you can make my wife understand how/why I think like this and that I can’t just shut it o
BRUSHBEATER
CIVIL DEFENSE MANUAL
DON SHIFT
PATREON
Support American Partisan on Patreon!
FORWARD OBSERVER
PLAN. PREPARE. PRESERVE. READY MADE RESOURCES
RADIO CONTRA PODCAST
Radio Contra
Radio Contra Episode 85: Protonmail Targeted by FBI? and Operation Cuba Li…
X
No compatible source was found for this media.
Radio Contra Episode 85: Protonmail Targeted by FBI? and Operation Cuba Libre Lessons Learned
01:02:14
Sons of Liberty 21: Australian fight for Freedom, Covid Medical Tyranny Shaping up in NYC and the Chinese House of Cards
02:02:19
Radio Contra Episode 84: Dark Winter: Tin Foil Conspiracy or Enemy Action?
01:04:40
Radio Contra Episode 83: MSM Smearing Patriots and Signals Intelligence Questions
01:04:10
Radio Contra Episode 82: Tools for Cooking Off Grid
AMAZON AFFILIATE
LIBERTAS-BELLA
PALMETTO STATE ARMORY
52:30
AMMO.COM
PICKETT’S MILL
GUNS N GEAR
ONE AMERICA NEWS NETWORK
Soccer-City ght back twice for 2-2 draw at Liverpool October 3, 2021
LIVERPOOL, England (Reuters) - Manchester City came from behind twice to earn a 2-2 draw with Liverpool on Sunday in a pulsating Premier League
encounter at An eld.
mayor
Cyclone Shaheen hits Oman, three killed, ights delayed October 3, 2021
DUBAI (Reuters) -Tropical Cyclone Shaheen hit land in Oman on Sunday having already killed at least three people, its heavy rain and ferocious winds
prompting evacuations from coastal areas and
mayor
German liberals and Social Democrats hold “constructive” coalition talks October 3, 2021
BERLIN (Reuters) -Germany's Free Democrats (FDP), potential kingmakers in negotiations to form a new coalition government, said exploratory talks with
election winners the Social Democrats on Sunday
mayor
Jordan’s Abdullah receives rst call from Syria’s Assad since start of con ict October 3, 2021
By Suleiman Al-Khalidi AMMAN (Reuters) -Jordan's King Abdullah received a phone call from Syrian President Bashar al-Assad, the royal palace said on
Sunday in what o cials said was the rst such
mayor
Cycling-Italian Colbrelli wins epic Paris-Roubaix classic October 3, 2021
ROUBAIX, France (Reuters) -Sonny Colbrelli became the rst Italian to win the Paris-Roubaix Monument classic in 22 years when he prevailed on his
debut in a three-man sprint nish at the end of a
mayor
FOOD SUPPLIES
PREPPER RECON PODCAST
VAERS/HHS Government Website Lists Hundreds of Thousands of People Killed or Injured by Jab August 12, 2021
On today’s show, I walk you through using the Government VAERS webpage so you can do your own research to determine how dangerous the COVID
Vaccine really is. The post VAERS/HHS Government Website Lists Hundreds of Thousands of People Killed or Injured by Jab appeared rst on Prepper
Recon.
The Great Tribulation-A Time of Unparalleled Chaos July 15, 2021
Congratulations to the Megiddo Giveaway winner J.K. Yates! I had the pleasure of appearing on the Prepper Website Podcast recently with Todd
Sepulveda. We talk about what to expect for those who miss the rapture and must endure the horrors […] ↓ Read the rest of this entry... The post The
Great Tribulation-A Time of […]
NOW AVAILABLE! Kingdom of Darkness, Book Three: Megiddo July 9, 2021
CLICK HERE TO GET YOUR COPY TODAY! And I heard a great voice out of the temple saying to the seven angels, “Go your ways, and pour out the vials of
the wrath of God upon the earth.” Revelation 16:1 […] ↓ Read the rest of this entry... The post NOW AVAILABLE! Kingdom of Darkness, […]
Jamie Lee Grey-Globalists Broadcast Next Phase of Takedown at Cyberpolygon 2021 June 16, 2021
Christian post-apocalyptic author Jamie Lee Grey joins me on the podcast today. We talk about the World Economic Forum’s upcoming Cyberpolygon. In
this event they’ll wargame a scenario in which the global supply chain comes under a coordinated cyber attack. The post Jamie Lee Grey-Globalists
Broadcast Next Phase of Takedown at Cyberpolygon 2021 appeared rst […]
James Wesley Rawles-Supply Chain Collapse and Money Printing Push US toward Hyperin ation May 19, 2021
James Wesley Rawles of SurvivalBlog.com joins me today to talk about the perfect storm of supply shortages and massive monetary creation which are
edging America closer to a complete hyperin ationary collapse. The post James Wesley Rawles-Supply Chain Collapse and Money Printing Push US
toward Hyperin ation appeared rst on Prepper Recon.
War on Humanity has Entered Critical Phase! April 17, 2021
The lockdowns, vaccines, stimulus checks, endless money printing, the World Economic Forum’s Great Reset, and climate change are all tied together.
They’re designed to push you into a state of fear, starvation, and hopelessness, so that you’re easier to control. […] ↓ Read the rest of this entry... The post
War on Humanity has Entered […]
The Kingdom of Darkness, Book Two: Brimstone is Now Available! March 5, 2021
Congratulations to Rivkah and Christopher, the winners of the Brimstone Giveaway! And I beheld, and heard an angel ying through the midst of heaven,
saying with a loud voice, Woe, woe, woe, to the inhabiters of the earth by reason […] ↓ Read the rest of this entry... The post The Kingdom of Darkness,
Book […]
Privacy and Clandestine Communications with NC Scout March 3, 2021
NC Scout from Brushbeater.org and American Partisan is back on the show today. We talk about how you can be more secure in your communications in
a world that is growing increasingly hostile toward conservatives. The post Privacy and Clandestine Communications with NC Scout appeared rst on
Prepper Recon.
The Republic has Fallen January 24, 2021
On today’s show, I talk about how we move forward from here. The post The Republic has Fallen appeared rst on Prepper Recon.
The Kingdom of Darkness, Book One: Tribulation is Now Available! December 4, 2020
Congratulations to Shawn, the winner of the Tribulation Giveaway! And the kings of the earth, and the great men, and the rich men, and the chief
captains, and the mighty men, and every bondman, and every free man, hid […] ↓ Read the rest of this entry... The post The Kingdom of Darkness, Book
[…]
MIRA GAS MASKS – CLEAN AIR ON THE SPOT
FOLLOW US

FACEBOOK

TWITTER
MASON DIXON TACTICAL – SURVIVAL CONSULTANTS, TRAINING & OUTFITTERS
UW GEAR – DON’T FORGET NOTHING
BISHOP 30 SOLUTIONS – CIVILIAN TRAINING
OUR AUTHORS
BADLANDS RIFLEMAN 10 Posts
BRUNA FILIPPOZZI 0 Posts
CONAN 15 Posts
DODGE JC 1 Post
DTG 0 Posts
DTG 0 Posts
GRAY MAN 54 Posts
HAWKEYE 81 Posts
HISTORIAN 9 Posts
HOLY SERF 20 Posts
IQ BRIAN 0 Posts
JC DODGE 137 Posts
JESSE JAMES 15 Posts
JESSE JAMES 53 Posts
JOHNNY PARATROOPER 132 Posts
JOHNYMAC 182 Posts
MATT BRACKEN 40 Posts
MECHMEDIC 3 Posts
MIKE 24 Posts
NC SCOUT 1489 Posts
NOELL BISHOP 0 Posts
PARACHUTIN FROGMAN 8 Posts
PATRIOTMAN 269 Posts
SAM CULPER / MIKE SHELBY 41 Posts
TX2GUNS 0 Posts
WP STEVE 0 Posts
WWES 8 Posts
Designed by Elegant Themes | Powered by WordPress
 
Download