Team Security and Vetting Course

NOTE: This class has been postponed. We will post more information later.. Thanks!



The Security and Vetting course is a two-day course that prepares students to obtain the skills needed to adequately validate and verify personnel in your teams and organizations. Over the course of two days, we cover the following topics:

• Introduction to Counterintelligence
• In Depth look at the threats of CI
• Operational Security
• Conversation and how to utilize it
• Elicitation skills (and Social Engineering)
• Assessing Credibility of Personnel
• Planning and Conducting a CI Interview


These topics are a broad overview, and we will dive much deeper into each topic. Multiple exercises are incorporated into the class to make sure students understand the topics and are able to competently perform them. This course will require critical thinking and coming out of your comfort zone.

The skills taught in this class can be utilized by any individual who values the integrity of their teams or organizations and wants to learn how to maintain that security. You will be given literature we will go over during the course and you will also receive access to exclusive content that you can access after the course to keep up with your skills. As these skills can be perishable if not practiced, we provide you all the tools required to maintain success.

The course is taught by Martin, a former Marine who served as a Counterintelligence and Human Intelligence Specialist. He currently teaches this class as part of Forward Observer Magazine.

Dates: July 23-24

Location: Seattle, WA

The class is $225 per person for the whole weekend. An advance deposit of $100 is required to hold your place in the class.

Email us to hold your seat!

Guerrilla Support Operations Course May 3-4, 2016

Every guerrilla movement needs a support infrastructure. Supplies, communications, safe houses, contacts, networks. These are the things that often get lost in the never-ending push to “run and gun.” Who supplies those folks? Who makes sure they get to where they’re needed? Who gives them the information they need to operate? How do you cultivate the trusted networks necessary to get things done? This Guerrilla Support Ops class will show you.

Taught by John Mosby of MountainGuerrilla, this class will cover the support operations for your group and network. You’ll learn how to perform the critical functions that make things run, the networks behind the scenes, how to set them up, communicate with them, and get things and people where they need to be. This is not a class you’ll want to miss, whether you’re in an established pyramid style group or an autonomous cell-based group.


Please note: This is a weeknight class, broken up into 2 nights.

Tuesday, 3 May 2016
Wednesday, 4 May 2016

Location: Auburn, WA (specific location undisclosed)
Times: 1730-2100

All vetting and security protocols apply. This class will fill up fast, so get in NOW!

For general questions, contact us at

To apply for entry, email


Don’t Use Web-Based Email Search Services for OSINT Unless…

We often use web-based email search to find information about an email address, and in some cases, to find out information about who that email address communicates with. For those of us performing open source intelligence (OSINT) research for our various groups and personal vetting, email search is pretty important. Two of the most known web-based email search services are Reverse Genie and Email Sherlock.

While the services do provide information you need about an email address, it also notifies the owner of the email address that someone in your geographical area performed that search, and gives them a copy of the information it provided to you. This compromises your research and possibly your identity, especially if the target is aware that they’re on your radar in the first place.

Obviously, having your target notified that you’ve done a search on their email address defeats many purposes.

(For a general explanation of OSINT and some of the tools available, you can start here with this paper. There are MANY more resources on the web, including here at TOWR.)

You might be asking “Well, what am I supposed to use then?” There are a few things you can try; we aren’t saying stop performing email searches. Some of the issues could possibly be averted by using a VPN for all OSINT research—and not using that same VPN server again or for anything else (there are a host of VPN servers out there, even if you stick with only one provider). Using the Tor Browser is also a common-sense given. In addition, I’d recommend doing your OSINT research from a public wifi not in your immediate area. We all love doing our work while in comfy pants and our own recliner, but doing things right is far more important than doing them conveniently.

Whatever you do, don’t stop vetting your people—and by vetting I don’t mean “checking their Facebook profile to see what they post about and if you have mutual friends.” Keep in mind that there are currently known federal agents and informants that have mutual friends with you…and might even be friends with you themselves….collecting everything you post. Remember: it only takes one mistake to compromise your entire group.

If you’d be interested in a one-day class on how to vet your people and tighten your contact networks, contact us at