Intelligence in Combating Terrorism (ICT)

Introduction

Intelligence in Combating Terorrism (ICT), also known by its course identifier 3C-F14/244-F8, is a course produced by the US Army Intelligence Center and School located at Fort Huachuca, AZ. (US Army Intelligence School, n.d.) It is a ten unit course that aims to teach the basics of how to leverage intelligence to understand and combat terrorism. This course is one of three courses used to train new military intelligence analysts. (Stemler, 2004, p. 12)

The course, as available online, includes an Instructor’s Manual that lists the learning outcomes, instructor’s notes, and content that should be covered during each slide.

The ten modules are listed below. Click each one to access the article on that module and download the full module from the Reimer Digital Library.

  1. Contemporary Terrorism ICT2A03L
  2. Development Operations ICT2A04L
  3. Ideologies and Motivations ICT2A06L
  4. Anatomy of a Terrorist Incident ICT2A07L
  5. Intelligence Support in Combatting Terrorism ICT2A08L
  6. Personal Protection Against Terrorism ICT2A09L
  7. Analytical Methods of Investigating Terrorism 13ICTXP9
  8. Analysis Automation ICT2B02L
  9. Threat Assessment of Military Installations ICT2B03L
  10. Unit Threat Assessment ICT2B04L

References

This bibliography refers to references found throughout all 10 modules.

Anti-Defamation League (ADL). (2005) “Christian Identity” Retrieved on August 21, 2016 from http://archive.adl.org/learn/ext_us/christian_identity.html
CNN Wire. (2011, May 9) “Obama says bin Laden had ‘support network’ in Pakistan”. Retrieved on August 19, 2016 from http://edition.cnn.com/2011/POLITICS/05/08/pakistan.us.relations/

Bejan, V., & Parkin, W. S. (2015). Examining the effect of repressive and conciliatory government actions on terrorism activity in Israel. Economics Letters, 55. doi:10.1016/j.econlet.2015.05.016

Bolton, J.R. (2015, Dec 31.) “Terrorism is the symptom, ideology the disease”. The Boston Globe. Retrieved on August 21, 2016 from https://www.aei.org/publication/terrorism-is-the-symptom-ideology-the-disease/

Byman, D. (2004) “Passive Sponsorship of Terrorism” Retrieved on August 19, 2016 from http://web.mit.edu/ssp/seminars/wed_archives04fall/byman.htm

Celmer, M.A. (1987) Terrorism, U.S. Strategy, and Reagan Policies. Westport, Connecticut: Greenwood Press.

Daily Record (Glasgow, Scotland). (2016, Jun. 7). RIGHT WING TERROR; EURO 2016 PLOT NEO-NAZI PLANNED BLOODBATH IN FRANCE Five Kalashnikovs, 5000 bullets, two anti-tank grenade launchers, 125kg of TNT, 100 detonators and 20 balaclavas.

da Silva, R.C. (2014) Responding to terror-related kidnapping: a torn Western reaction. Human Rights and Conflict Resolution. 3(6). Human Security Centre. Retrieved on August 21, 2016 from http://www.hscentre.org/middle-east-and-north-africa/responding-terror-related-kidnapping-torn-western-reaction/

Department of Defense (DoD). (2006) “DoD Antiterrorism (AT) Standards.” Retrieved on August 21, 2016 from http://www.dtic.mil/whs/directives/corres/pdf/200016p.pdf

Department of Defense. (2007) Department of Defense Education Activity Antiterrorism Program and Standards. Retrieved on August 21, 2016 from http://www.dodea.edu/Offices/Regulations/loader.cfm?csModule=security/getfile&pageid=92517

Federal Bureau of Investigation (FBI). (2001) “Terrorism | National Institute of Justice”. Retrieved on August 19, 2016 from http://www.nij.gov/topics/crime/terrorism/pages/welcome.aspx

Federal Bureau of Investigation (FBI). (2005) “Terrorism 2002 – 2005”. Retrieved on August 19, 2016 from https://www.fbi.gov/file-repository/stats-services-publications-terrorism-2002-2005-terror02_05.pdf

Harris-Hogan, S. (2013). Anatomy of a terrorist cell: A study of the network uncovered in Sydney in 2005. Behavioral Sciences Of Terrorism And Political Aggression, 5(2), 137-154. doi:10.1080/19434472.2012.727096

Knickerbocker, B. (2015, Apr. 18) “Oklahoma City bombing: Right-wing extremist threat 20 years later (+video)” The Christian Science Monitor. Retrieved on August 20, 2016 from http://www.csmonitor.com/USA/Justice/2015/0418/Oklahoma-City-bombing-Right-wing-extremist-threat-20-years-later-video

Mauro, R. (2014) “Understanding Islamist Extremism. The Clarion Project. Retrieved on August 21, 2016 from http://www.clarionproject.org/understanding-islamism/islamic-extremism

Prescott, B. (2010) “An Accurate Look at Timothy McVeigh’s Beliefs” EthicsDaily. Retrieved on August 20, 2016 from http://www.ethicsdaily.com/an-accurate-look-at-timothy-mcveighs-beliefs-cms-15532

State Department. (2001) “Executive Order 13224” Retrieved on August 19, 2016 from http://www.state.gov/j/ct/rls/other/des/122570.htm

Seger, K.A. (2001) Left-Wing Extremism: The Current Threat. Center for Human Reliability Studies. Retrieved on August 21, 2016 from https://fas.org/irp/world/para/left.pdf

Stemler, G. (2004) Overview of MI Initial Entry Training Courses Taught By the 309th MI Battalion. Military Intelligence Professional Bulletin. (30)2. Retrieved on August 18, 2016 from https://fas.org/irp/agency/army/mipb/2004_02.pdf

Stratfor. (2012) Defining the Terrorist Attack Cycle. Retrieved on August 21, 2016 from https://www.stratfor.com/image/defining-terrorist-attack-cycle

US Army Intelligence School. (n.d.) “Intelligence in Combating Terrorism (ICT) Course”. Retrieved on August 19, 2016 from https://rdl.train.army.mil/catalog-ws/view/100.ATSC/DAFE4E3C-4079-413C-8C7E-3F71D6CC6501-1274121137112/ICT/ICT.htm?trk=profile_certification_title

US Army. (1993) “AR 381-20 The Army Counterintelligence Program”. Retrieved on August 21, 2016 from https://fas.org/irp/doddir/army/ar381-20.pdf

US Army. (1995) “Field Manual 34-60 Counterintelligence” Retrieved on August 21, 2016 from https://www.aclu.org/files/projects/foiasearch/pdf/DODDOA006278.pdf

US Army. (2002) “Army Regulation 525–13 Antiterrorism”. Retrieved on August 19, 2016 from http://download.cabledrum.net/wikileaks_archive/file/ar-525-13–2002-1.pdf

US Army. (2013) “JP2-0 Joint Intelligence”. Retrieved on August 21, 2016 from http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf

Vohryzek-Bolden, M., Olson-Raymer, G. & Whamond, J.O. (2001) Special-Interest Extremists and Terrorists (From Domestic Terrorism and Incident Management: Issues and Tactics, pp. 140-172.

Westcott, K. (2013) “What is Stockholm syndrome?” BBC News Magazine. Retrieved on August 21, 2016 from http://www.bbc.com/news/magazine-22447726

Cite this article as: MacDonald, D.K., (2017), "Intelligence in Combating Terrorism (ICT)," retrieved on December 9, 2022 from http://dustinkmacdonald.com/intelligence-in-combating-terrorism-ict/.

Leave a Reply

Your email address will not be published.