Dustin K MacDonald

Menu
  • Home
  • About
  • Economic and Community Development
  • Nonprofit Management
    • Counselling and Service Delivery
    • Suicide Prevention / Crisis Intervention
  • Politics and Governance
  • Math and Statistics
  • Salesforce
Menu

Intelligence in Combating Terrorism (ICT)

Posted on July 22, 2017November 23, 2019 by Dustin

Introduction

Intelligence in Combating Terorrism (ICT), also known by its course identifier 3C-F14/244-F8, is a course produced by the US Army Intelligence Center and School located at Fort Huachuca, AZ. (US Army Intelligence School, n.d.) It is a ten unit course that aims to teach the basics of how to leverage intelligence to understand and combat terrorism. This course is one of three courses used to train new military intelligence analysts. (Stemler, 2004, p. 12)

The course, as available online, includes an Instructor’s Manual that lists the learning outcomes, instructor’s notes, and content that should be covered during each slide.

The ten modules are listed below. Click each one to access the article on that module and download the full module from the Reimer Digital Library.

  1. Contemporary Terrorism ICT2A03L
  2. Development Operations ICT2A04L
  3. Ideologies and Motivations ICT2A06L
  4. Anatomy of a Terrorist Incident ICT2A07L
  5. Intelligence Support in Combatting Terrorism ICT2A08L
  6. Personal Protection Against Terrorism ICT2A09L
  7. Analytical Methods of Investigating Terrorism 13ICTXP9
  8. Analysis Automation ICT2B02L
  9. Threat Assessment of Military Installations ICT2B03L
  10. Unit Threat Assessment ICT2B04L

References

This bibliography refers to references found throughout all 10 modules.

Anti-Defamation League (ADL). (2005) “Christian Identity” Retrieved on August 21, 2016 from http://archive.adl.org/learn/ext_us/christian_identity.html
CNN Wire. (2011, May 9) “Obama says bin Laden had ‘support network’ in Pakistan”. Retrieved on August 19, 2016 from http://edition.cnn.com/2011/POLITICS/05/08/pakistan.us.relations/

Bejan, V., & Parkin, W. S. (2015). Examining the effect of repressive and conciliatory government actions on terrorism activity in Israel. Economics Letters, 55. doi:10.1016/j.econlet.2015.05.016

Bolton, J.R. (2015, Dec 31.) “Terrorism is the symptom, ideology the disease”. The Boston Globe. Retrieved on August 21, 2016 from https://www.aei.org/publication/terrorism-is-the-symptom-ideology-the-disease/

Byman, D. (2004) “Passive Sponsorship of Terrorism” Retrieved on August 19, 2016 from http://web.mit.edu/ssp/seminars/wed_archives04fall/byman.htm

Celmer, M.A. (1987) Terrorism, U.S. Strategy, and Reagan Policies. Westport, Connecticut: Greenwood Press.

Daily Record (Glasgow, Scotland). (2016, Jun. 7). RIGHT WING TERROR; EURO 2016 PLOT NEO-NAZI PLANNED BLOODBATH IN FRANCE Five Kalashnikovs, 5000 bullets, two anti-tank grenade launchers, 125kg of TNT, 100 detonators and 20 balaclavas.

da Silva, R.C. (2014) Responding to terror-related kidnapping: a torn Western reaction. Human Rights and Conflict Resolution. 3(6). Human Security Centre. Retrieved on August 21, 2016 from http://www.hscentre.org/middle-east-and-north-africa/responding-terror-related-kidnapping-torn-western-reaction/

Department of Defense (DoD). (2006) “DoD Antiterrorism (AT) Standards.” Retrieved on August 21, 2016 from http://www.dtic.mil/whs/directives/corres/pdf/200016p.pdf

Department of Defense. (2007) Department of Defense Education Activity Antiterrorism Program and Standards. Retrieved on August 21, 2016 from http://www.dodea.edu/Offices/Regulations/loader.cfm?csModule=security/getfile&pageid=92517

Federal Bureau of Investigation (FBI). (2001) “Terrorism | National Institute of Justice”. Retrieved on August 19, 2016 from http://www.nij.gov/topics/crime/terrorism/pages/welcome.aspx

Federal Bureau of Investigation (FBI). (2005) “Terrorism 2002 – 2005”. Retrieved on August 19, 2016 from https://www.fbi.gov/file-repository/stats-services-publications-terrorism-2002-2005-terror02_05.pdf

Harris-Hogan, S. (2013). Anatomy of a terrorist cell: A study of the network uncovered in Sydney in 2005. Behavioral Sciences Of Terrorism And Political Aggression, 5(2), 137-154. doi:10.1080/19434472.2012.727096

Knickerbocker, B. (2015, Apr. 18) “Oklahoma City bombing: Right-wing extremist threat 20 years later (+video)” The Christian Science Monitor. Retrieved on August 20, 2016 from http://www.csmonitor.com/USA/Justice/2015/0418/Oklahoma-City-bombing-Right-wing-extremist-threat-20-years-later-video

Mauro, R. (2014) “Understanding Islamist Extremism. The Clarion Project. Retrieved on August 21, 2016 from http://www.clarionproject.org/understanding-islamism/islamic-extremism

Prescott, B. (2010) “An Accurate Look at Timothy McVeigh’s Beliefs” EthicsDaily. Retrieved on August 20, 2016 from http://www.ethicsdaily.com/an-accurate-look-at-timothy-mcveighs-beliefs-cms-15532

State Department. (2001) “Executive Order 13224” Retrieved on August 19, 2016 from http://www.state.gov/j/ct/rls/other/des/122570.htm

Seger, K.A. (2001) Left-Wing Extremism: The Current Threat. Center for Human Reliability Studies. Retrieved on August 21, 2016 from https://fas.org/irp/world/para/left.pdf

Stemler, G. (2004) Overview of MI Initial Entry Training Courses Taught By the 309th MI Battalion. Military Intelligence Professional Bulletin. (30)2. Retrieved on August 18, 2016 from https://fas.org/irp/agency/army/mipb/2004_02.pdf

Stratfor. (2012) Defining the Terrorist Attack Cycle. Retrieved on August 21, 2016 from https://www.stratfor.com/image/defining-terrorist-attack-cycle

US Army Intelligence School. (n.d.) “Intelligence in Combating Terrorism (ICT) Course”. Retrieved on August 19, 2016 from https://rdl.train.army.mil/catalog-ws/view/100.ATSC/DAFE4E3C-4079-413C-8C7E-3F71D6CC6501-1274121137112/ICT/ICT.htm?trk=profile_certification_title

US Army. (1993) “AR 381-20 The Army Counterintelligence Program”. Retrieved on August 21, 2016 from https://fas.org/irp/doddir/army/ar381-20.pdf

US Army. (1995) “Field Manual 34-60 Counterintelligence” Retrieved on August 21, 2016 from https://www.aclu.org/files/projects/foiasearch/pdf/DODDOA006278.pdf

US Army. (2002) “Army Regulation 525–13 Antiterrorism”. Retrieved on August 19, 2016 from http://download.cabledrum.net/wikileaks_archive/file/ar-525-13–2002-1.pdf

US Army. (2013) “JP2-0 Joint Intelligence”. Retrieved on August 21, 2016 from http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf

Vohryzek-Bolden, M., Olson-Raymer, G. & Whamond, J.O. (2001) Special-Interest Extremists and Terrorists (From Domestic Terrorism and Incident Management: Issues and Tactics, pp. 140-172.

Westcott, K. (2013) “What is Stockholm syndrome?” BBC News Magazine. Retrieved on August 21, 2016 from http://www.bbc.com/news/magazine-22447726

Cite this article as: MacDonald, D.K., (2017), "Intelligence in Combating Terrorism (ICT)," retrieved on December 6, 2023 from https://dustinkmacdonald.com/intelligence-in-combating-terrorism-ict/.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Privacy Policy

See here for our privacy policy. This site uses affiliate links and Adsense ads to provide targeted advertising.

Tags

analytical technique assessment communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance information technology intelligence intelligence analysis keokuk county language learning legal management peer support personal development phd politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training university of the cumberlands violence risk assessment youth

Recommended Posts

  • Conducting Psychosocial Assessments
  • DCIB Model of Suicide Risk Assessment
  • ABC Model of Crisis Intervention
  • My Friend is Suicidal - What do I do?

Recent Posts

  • ITS833 Information Governance
  • Enhanced Care Management (ECM) with Salesforce
  • ITS835 Enterprise Risk Management
  • Glorifind Christian Search Engine
  • Sigourney Iowa Election Results, 2023

Archives

  • November 2023 (6)
  • October 2023 (1)
  • September 2023 (3)
  • August 2023 (1)
  • July 2023 (1)
  • May 2023 (1)
  • March 2023 (1)
  • February 2023 (2)
  • January 2023 (4)
  • December 2022 (2)
  • May 2022 (1)
  • April 2022 (2)
  • March 2022 (1)
  • February 2022 (1)
  • December 2021 (1)
  • October 2021 (1)
  • August 2021 (2)
  • May 2021 (3)
  • December 2020 (1)
  • November 2020 (4)
  • July 2020 (1)
  • June 2020 (1)
  • April 2020 (1)
  • March 2020 (4)
  • February 2020 (7)
  • January 2020 (1)
  • November 2019 (1)
  • October 2019 (2)
  • September 2019 (4)
  • August 2019 (2)
  • March 2019 (1)
  • February 2019 (1)
  • January 2019 (1)
  • December 2018 (4)
  • November 2018 (3)
  • October 2018 (3)
  • September 2018 (19)
  • October 2017 (2)
  • September 2017 (2)
  • August 2017 (1)
  • July 2017 (39)
  • May 2017 (3)
  • April 2017 (4)
  • March 2017 (4)
  • February 2017 (4)
  • January 2017 (5)
  • December 2016 (4)
  • November 2016 (4)
  • October 2016 (5)
  • September 2016 (4)
  • August 2016 (5)
  • July 2016 (5)
  • June 2016 (5)
  • May 2016 (3)
  • April 2016 (2)
  • March 2016 (2)
  • February 2016 (2)
  • January 2016 (4)
  • December 2015 (2)
  • November 2015 (2)
  • October 2015 (2)
  • September 2015 (2)
  • August 2015 (1)
  • June 2015 (2)
  • May 2015 (5)
  • April 2015 (3)
  • March 2015 (8)
  • February 2015 (12)
  • January 2015 (28)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • Dustin on Starting a Crisis Line or Hotline
  • HAPPINESSHEALTHCOURAGE, LLC on Starting a Crisis Line or Hotline
  • ITS833 Information Governance - Dustin K MacDonald on University of the Cumberlands PhD in Information Technology
  • Elected Officials in Sigourney, Iowa - Dustin K MacDonald on Sigourney Iowa Election Results, 2023
  • ITS 835 Enterprise Risk Management - Dustin K MacDonald on University of the Cumberlands PhD in Information Technology

Tags

analytical technique assessment communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance information technology intelligence intelligence analysis keokuk county language learning legal management peer support personal development phd politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training university of the cumberlands violence risk assessment youth
© 2023 Dustin K MacDonald | Powered by Minimalist Blog WordPress Theme