Disassembly and Identification of Command and Control Structure and Key Individuals of Organizations

This short blurb is about the dissection of the hierarchy of a nonprofit or a for- profit organization using Internet open sources and information. Such analysis is useful for counterintelligence or intelligence investigations of organizations and/or their authoritative actors. Such fact gathering and profiling is very useful and necessary for vetting these entities and players or for just info foraying missions, also known as spying.

Many for profit corporations are very open for legal and tax reasons about their organizational hierarchical chart or charts. Using these published top-down charts, the chain of command and control is usually clearly delineated by the positions in the diagrams. Clearing the organization is typically a top-down process guided by need-to-know level-by-level constraints.

The process of surreptitiously vetting or sub rosa internal data garnering is much more difficult for organizations that can by law be less open about their power structure. In this case, open Internet sources and web apps can be extremely useful in elucidating the structure of a secretive organization. Suppose for instance that the organization only resides in the state of Georgia in the United States then you can find information from the licenses of the employees which are granted by the Georgia Secretary of State Department:

http://verify.sos.ga.gov/verification/

A number of licenses can be found using the preceding search engine. If you are interested in a medical doctor then use the search engine:

https://medicalboard.georgia.gov/look-licensee

For an attorney, you must use the following search engine:

https://www.gabar.org/membership/membersearch.cfm

The search techniques vary from state-to-state within the United States.

An especially useful tool for medical organizations is the NPI Profile:

https://npiprofile.com/npi-lookup

An algorithm for determining the employees and their roles of a small state-wide distributed mental health organization would consist of:

  1. Identifying all the typical roles of the organization
  2. Identifying the addresses of the distributed organization
  3. For each address elucidate the case managers, counselors, nurses, physicians, etc.

Further information can be obtained by perusing online articles and data published by the organization.

The best way of getting real-time and definitive organizational intelligence data is by inserting a vetted operative also known as a spy into the organization. If this optimal technique turns out to be unavailable then another option is to bribe or blackmail a current employee and convert that individual into a double agent. The key trick in enticing an employee to turn into a double agent is to somehow placing that person in an ethical, legally, and/or morally compromising situation.

Unknown's avatar

Author: jamespatewilliamsjr

My whole legal name is James Pate Williams, Jr. I was born in LaGrange, Georgia approximately 70 years ago. I barely graduated from LaGrange High School with low marks in June 1971. Later in June 1979, I graduated from LaGrange College with a Bachelor of Arts in Chemistry with a little over a 3 out 4 Grade Point Average (GPA). In the Spring Quarter of 1978, I taught myself how to program a Texas Instruments desktop programmable calculator and in the Summer Quarter of 1978 I taught myself Dayton BASIC (Beginner's All-purpose Symbolic Instruction Code) on LaGrange College's Data General Eclipse minicomputer. I took courses in BASIC in the Fall Quarter of 1978 and FORTRAN IV (Formula Translator IV) in the Winter Quarter of 1979. Professor Kenneth Cooper, a genius poly-scientist taught me a course in the Intel 8085 microprocessor architecture and assembly and machine language. We would hand assemble our programs and insert the resulting machine code into our crude wooden box computer which was designed and built by Professor Cooper. From 1990 to 1994 I earned a Bachelor of Science in Computer Science from LaGrange College. I had a 4 out of 4 GPA in the period 1990 to 1994. I took courses in C, COBOL, and Pascal during my BS work. After graduating from LaGrange College a second time in May 1994, I taught myself C++. In December 1995, I started using the Internet and taught myself client-server programming. I created a website in 1997 which had C and C# implementations of algorithms from the "Handbook of Applied Cryptography" by Alfred J. Menezes, et. al., and some other cryptography and number theory textbooks and treatises.

Leave a comment