Introduction IT0425, Introduction to Battlefield Technical Intelligence is a subcourse in the Advanced Intelligence Analyst Course. You can download it here, or see below for a brief summary of its contents. The course includes multiple choice exercises that have not been reproduced here. Learning Objectives Describe TECHINT, its mission, how it is organized, and its…
Month: September 2018
Protection of Civilians
Introduction ATP3-07-6 Protection of Civilians is a US Army manual designed to help leaders reduce the impact of military operations on non-combatants. As they define it, “protection of civilians refers to efforts that reduce civilian risks from physical violence, secure their rights to essential services and resources, and contribute to a secure, stable, and just…
Sending Anonymous Emails
Introduction Sometimes it can be useful to send emails that are anonymous. This can be because you need to communicate information in an emergency without it being traced back to you, or for a variety of other reasons. It is important to ensure that anonymous emails are sent for good reasons only – and not…
Unit Threat Assessment ICT2B04L
The final module is Unit Threat Assessment. This follows the same procedures as the previous module but focuses on the elements relevant to personnel in particular, rather than to installations. While bombings or mortar attacks might be threats more relevant to installations, kidnappings are more relevant to individual soldiers. Because there is no major differences…
Threat Assessment of Military Installations ICT2B03L
This module focuses on the practical elements of conducting a threat assessment for a military installation. Threat assessment is broken down into five phases: Study the Adversary Study the Support Element Assessment Recommendations Writing the Report Phase I – Study the Adversary Elements to explore include: The enemy’s security and intelligence apparatus Conventional forces (in…