• Irregular Threats; terrorism, insurgency, instability, unconventional warfare, corruption, crime, threat financing, transnational organized crime, the proliferation of WMDs, and the nexus between these threats.  

    Irregular Threats

    http://irregular-threats.usefedora.com/

  • Intro: 

    Irregular Threats is an advanced level, non-classified, online, course-ware set that provides accurate information about the vast array of irregular threats that our society is faced with today. Terrorism is of course the number one issue, but with terrorism sometimes insurgency, instability, unconventional warfare, corruption, and crime accompanying terrorism.

     

    Indirect approaches, as compared to direct approaches, are the best means to mitigate irregular threats. Indirect activities include stability operations, foreign internal defense (FID), counterinsurgency (COIN), counter-terrorism (CT), counter threat financing, and counter unconventional warfare (C-UW). Indirect approaches are more effective and last longer. Direct approaches are forceful or kinetic approaches. 

  • Editors Qualifications/Experiences

    Abrams Learning and Information Systems, Inc.

    Subject Matter Expert 1 (SME Master Level) 20-yrs. + 

    – Present

     

    Analyst, Researcher, Consultant: Develops professional training and training products such as doctrine, courses, and courseware for Irregular Threats. This includes Irregular Warfare (IW), Counterinsurgency (COIN), Counterterrorism (CT), Unconventional Warfare (UW), Transnational Criminal Organizations (TCO), Stability Operations, Anti-Money Laundering/Counterterrorism Financing, Joint Intel Prep of the Operational Environment (JIPOE). Single-handedly researched, designed, and developed an advanced level, online, non-classified course for terrorism and other irregular threats. The course was in response to a DOD Combatting Terrorism Technical Support Office contract solicitation.

    DynCorp International

    NATO Training Mission (NTM-A) Curriculum Developer & Site Lead 

    – Oct 2012

     

    Researched, analyzed, designed, developed, integrated, fused, and produced area specific up-to-date and relevant training for the COIN Leaders Course, District Stability Framework, AFPAK Hands, and Ministerial Advisors courses. Including learning outcomes, teaching points, and sequencing. Coordinated with ISAF J2, CAAT, SOIC, CSOC, VSO / ALP, APRP, TF-Shafafiyat, DOS, PRTs, AFPAK Hands, and USAID to update core material and improve the advisory capacity of the various ISAF elements. Supervised, designed, and developed TSPs, POIs, lesson plans, AARs, and evaluation methodologies. Assisted with and lead curriculum review boards to identify how training and curriculums could be improved. Worked with and assisted a staff of multinational military and police officers from Afghanistan, Australia, Canada, Great Britain, Jordan, France, Italy, and the U. S. Acted as site lead and supervised and counseled a team of 3 lessoned learned staff and 13 COIN instructors.

    MPRI

    Kuwait Observer / Controller, (KOCT) 

    – Aug 2009

     

    (A) Developed, demonstrated, and evaluated search / site exploitation TTPs in a JIEDDO Search House. TTPs included; planning, execution, tasks, duties, organization, responsibilities, evidence recovery, legal issues, CREW use, CIED topics, and the role and utilization of enablers, targeting, and intelligence assets. Evaluated and critiqued 30-students as they conducted an SE mission. (B) Developed, taught, and evaluated 30-students on a two day 13 km long, TCP, STX lane. Researched core and course material, designed primary and secondary POIs, developed TTPs, integrated intelligence from WIT, CEXC, Red & Green Hash Mark documents, and Road Warrior Reports. Trained, and supervised 75 local role players, designed, developed, and initiated complex scenarios, and evaluated and critiqued students’ performance. (C) Taught CQM, CQB, foreign weapons, and urban operations on various live fire ranges, within 360% shoot houses, and on a platoon size live-fire urban assault range.

  • Inspirations

     

     

    Ecclesiastes 7:12 For the protection of wisdom is like the protection of money, and the advantage of knowledge is that wisdom preserves the life of him who has it.

     

    Proverbs 4:7 Wisdom is the principal thing; therefore get wisdom: and with all thy getting get understanding.

  • EDUCATION

     

    Henley-Putnam

    Strategic Intelligence and Targeting, Graduate Certification, 2014 - Dec. 2015

     

     

    Association of Anti-Money Laundering Counterterrorism Financing Specialists (ACAMS) 

    AML/CTF with an emphasis in Threat Financing 2014-15 (Seeking Certification)

    Anti-Terrorism Accreditation Board (ATAB)

    Certified Master Anti-terrorism Specialist (CMAS) 2014-15

    Counterinsurgency Training Centers (CTC-A) NATO Training Mission-Afghanistan (NTM-A)

    Counterinsurgency, Counterterrorism, Stability Operation's, Information & Intelligence collection, analysis, production & dissemination, Intelligence Preparation of the Environment/Battle Space or Area of OP, 2010-12

    Chapman University

    Master's Degree Psychology 1999 - 2001

     

    Saint Martin's University

    BA Psychology Counseling

    1995 - 1998

     

     

  • SKILLS

     

    Intelligence Analysis

    Counterinsurgency

    Counterterrorism

    Stability Operations

    Counter Terrorism Financing

    Organized Criminal Activity

    Open Source Info/Intel 

    research/analysis 

    Intelligence Targeting

  • LET'S CHAT

    Phone

    Washington D.C. Metro Area

  • CONTACT ME!