Dustin K MacDonald

Menu
  • Home
  • About
  • Economic and Community Development
  • Nonprofit Management
    • Counselling and Service Delivery
    • Suicide Prevention / Crisis Intervention
  • Politics and Governance
  • Math and Statistics
  • Portfolio
Menu

Intelligence in Combating Terrorism (ICT)

Posted on July 22, 2017November 23, 2019 by Dustin

Introduction

Intelligence in Combating Terorrism (ICT), also known by its course identifier 3C-F14/244-F8, is a course produced by the US Army Intelligence Center and School located at Fort Huachuca, AZ. (US Army Intelligence School, n.d.) It is a ten unit course that aims to teach the basics of how to leverage intelligence to understand and combat terrorism. This course is one of three courses used to train new military intelligence analysts. (Stemler, 2004, p. 12)

The course, as available online, includes an Instructor’s Manual that lists the learning outcomes, instructor’s notes, and content that should be covered during each slide.

The ten modules are listed below. Click each one to access the article on that module and download the full module from the Reimer Digital Library.

  1. Contemporary Terrorism ICT2A03L
  2. Development Operations ICT2A04L
  3. Ideologies and Motivations ICT2A06L
  4. Anatomy of a Terrorist Incident ICT2A07L
  5. Intelligence Support in Combatting Terrorism ICT2A08L
  6. Personal Protection Against Terrorism ICT2A09L
  7. Analytical Methods of Investigating Terrorism 13ICTXP9
  8. Analysis Automation ICT2B02L
  9. Threat Assessment of Military Installations ICT2B03L
  10. Unit Threat Assessment ICT2B04L

References

This bibliography refers to references found throughout all 10 modules.

Anti-Defamation League (ADL). (2005) “Christian Identity” Retrieved on August 21, 2016 from http://archive.adl.org/learn/ext_us/christian_identity.html
CNN Wire. (2011, May 9) “Obama says bin Laden had ‘support network’ in Pakistan”. Retrieved on August 19, 2016 from http://edition.cnn.com/2011/POLITICS/05/08/pakistan.us.relations/

Bejan, V., & Parkin, W. S. (2015). Examining the effect of repressive and conciliatory government actions on terrorism activity in Israel. Economics Letters, 55. doi:10.1016/j.econlet.2015.05.016

Bolton, J.R. (2015, Dec 31.) “Terrorism is the symptom, ideology the disease”. The Boston Globe. Retrieved on August 21, 2016 from https://www.aei.org/publication/terrorism-is-the-symptom-ideology-the-disease/

Byman, D. (2004) “Passive Sponsorship of Terrorism” Retrieved on August 19, 2016 from http://web.mit.edu/ssp/seminars/wed_archives04fall/byman.htm

Celmer, M.A. (1987) Terrorism, U.S. Strategy, and Reagan Policies. Westport, Connecticut: Greenwood Press.

Daily Record (Glasgow, Scotland). (2016, Jun. 7). RIGHT WING TERROR; EURO 2016 PLOT NEO-NAZI PLANNED BLOODBATH IN FRANCE Five Kalashnikovs, 5000 bullets, two anti-tank grenade launchers, 125kg of TNT, 100 detonators and 20 balaclavas.

da Silva, R.C. (2014) Responding to terror-related kidnapping: a torn Western reaction. Human Rights and Conflict Resolution. 3(6). Human Security Centre. Retrieved on August 21, 2016 from http://www.hscentre.org/middle-east-and-north-africa/responding-terror-related-kidnapping-torn-western-reaction/

Department of Defense (DoD). (2006) “DoD Antiterrorism (AT) Standards.” Retrieved on August 21, 2016 from http://www.dtic.mil/whs/directives/corres/pdf/200016p.pdf

Department of Defense. (2007) Department of Defense Education Activity Antiterrorism Program and Standards. Retrieved on August 21, 2016 from http://www.dodea.edu/Offices/Regulations/loader.cfm?csModule=security/getfile&pageid=92517

Federal Bureau of Investigation (FBI). (2001) “Terrorism | National Institute of Justice”. Retrieved on August 19, 2016 from http://www.nij.gov/topics/crime/terrorism/pages/welcome.aspx

Federal Bureau of Investigation (FBI). (2005) “Terrorism 2002 – 2005”. Retrieved on August 19, 2016 from https://www.fbi.gov/file-repository/stats-services-publications-terrorism-2002-2005-terror02_05.pdf

Harris-Hogan, S. (2013). Anatomy of a terrorist cell: A study of the network uncovered in Sydney in 2005. Behavioral Sciences Of Terrorism And Political Aggression, 5(2), 137-154. doi:10.1080/19434472.2012.727096

Knickerbocker, B. (2015, Apr. 18) “Oklahoma City bombing: Right-wing extremist threat 20 years later (+video)” The Christian Science Monitor. Retrieved on August 20, 2016 from http://www.csmonitor.com/USA/Justice/2015/0418/Oklahoma-City-bombing-Right-wing-extremist-threat-20-years-later-video

Mauro, R. (2014) “Understanding Islamist Extremism. The Clarion Project. Retrieved on August 21, 2016 from http://www.clarionproject.org/understanding-islamism/islamic-extremism

Prescott, B. (2010) “An Accurate Look at Timothy McVeigh’s Beliefs” EthicsDaily. Retrieved on August 20, 2016 from http://www.ethicsdaily.com/an-accurate-look-at-timothy-mcveighs-beliefs-cms-15532

State Department. (2001) “Executive Order 13224” Retrieved on August 19, 2016 from http://www.state.gov/j/ct/rls/other/des/122570.htm

Seger, K.A. (2001) Left-Wing Extremism: The Current Threat. Center for Human Reliability Studies. Retrieved on August 21, 2016 from https://fas.org/irp/world/para/left.pdf

Stemler, G. (2004) Overview of MI Initial Entry Training Courses Taught By the 309th MI Battalion. Military Intelligence Professional Bulletin. (30)2. Retrieved on August 18, 2016 from https://fas.org/irp/agency/army/mipb/2004_02.pdf

Stratfor. (2012) Defining the Terrorist Attack Cycle. Retrieved on August 21, 2016 from https://www.stratfor.com/image/defining-terrorist-attack-cycle

US Army Intelligence School. (n.d.) “Intelligence in Combating Terrorism (ICT) Course”. Retrieved on August 19, 2016 from https://rdl.train.army.mil/catalog-ws/view/100.ATSC/DAFE4E3C-4079-413C-8C7E-3F71D6CC6501-1274121137112/ICT/ICT.htm?trk=profile_certification_title

US Army. (1993) “AR 381-20 The Army Counterintelligence Program”. Retrieved on August 21, 2016 from https://fas.org/irp/doddir/army/ar381-20.pdf

US Army. (1995) “Field Manual 34-60 Counterintelligence” Retrieved on August 21, 2016 from https://www.aclu.org/files/projects/foiasearch/pdf/DODDOA006278.pdf

US Army. (2002) “Army Regulation 525–13 Antiterrorism”. Retrieved on August 19, 2016 from http://download.cabledrum.net/wikileaks_archive/file/ar-525-13–2002-1.pdf

US Army. (2013) “JP2-0 Joint Intelligence”. Retrieved on August 21, 2016 from http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf

Vohryzek-Bolden, M., Olson-Raymer, G. & Whamond, J.O. (2001) Special-Interest Extremists and Terrorists (From Domestic Terrorism and Incident Management: Issues and Tactics, pp. 140-172.

Westcott, K. (2013) “What is Stockholm syndrome?” BBC News Magazine. Retrieved on August 21, 2016 from http://www.bbc.com/news/magazine-22447726

Cite this article as: MacDonald, D.K., (2017), "Intelligence in Combating Terrorism (ICT)," retrieved on May 17, 2022 from https://dustinkmacdonald.com/intelligence-in-combating-terrorism-ict/.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Privacy Policy

See here for our privacy policy. This site uses affiliate links and Adsense ads to provide targeted advertising.

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance humint intelligence intelligence analysis keokuk county language learning legal local government machine learning management peer support personal development politics professional development protective factors psychosocial risk factors safety planning sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training violence risk assessment youth

Recommended Posts

  • Conducting Psychosocial Assessments
  • DCIB Model of Suicide Risk Assessment
  • ABC Model of Crisis Intervention
  • My Friend is Suicidal - What do I do?

Recent Posts

  • Keokuk County Redistricting
  • Eastern University MS in Data Science 2022 Review
  • DTSC-691 Example Project Proposal: Predicting Nonprofit Collapse Using IRS Data
  • Using Pandas to Iterate Through a List of Files
  • DTSC-670 Tips and Tricks

Archives

  • May 2022 (1)
  • April 2022 (2)
  • March 2022 (1)
  • February 2022 (1)
  • December 2021 (1)
  • October 2021 (1)
  • August 2021 (2)
  • May 2021 (3)
  • December 2020 (1)
  • November 2020 (4)
  • July 2020 (1)
  • June 2020 (1)
  • April 2020 (1)
  • March 2020 (4)
  • February 2020 (7)
  • January 2020 (1)
  • November 2019 (1)
  • October 2019 (2)
  • September 2019 (4)
  • August 2019 (2)
  • March 2019 (1)
  • February 2019 (1)
  • January 2019 (1)
  • December 2018 (4)
  • November 2018 (3)
  • October 2018 (3)
  • September 2018 (19)
  • October 2017 (2)
  • September 2017 (2)
  • August 2017 (1)
  • July 2017 (39)
  • May 2017 (3)
  • April 2017 (4)
  • March 2017 (4)
  • February 2017 (4)
  • January 2017 (5)
  • December 2016 (4)
  • November 2016 (4)
  • October 2016 (5)
  • September 2016 (4)
  • August 2016 (5)
  • July 2016 (5)
  • June 2016 (5)
  • May 2016 (3)
  • April 2016 (2)
  • March 2016 (2)
  • February 2016 (2)
  • January 2016 (4)
  • December 2015 (2)
  • November 2015 (2)
  • October 2015 (2)
  • September 2015 (2)
  • August 2015 (1)
  • June 2015 (2)
  • May 2015 (5)
  • April 2015 (3)
  • March 2015 (8)
  • February 2015 (12)
  • January 2015 (28)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • porcelina on Eastern University MS in Data Science 2022 Review
  • Dustin on Eastern University MS in Data Science 2022 Review
  • porcelina on Eastern University MS in Data Science 2022 Review
  • Eastern University MS in Data Science 2022 Review - Dustin K MacDonald on DTSC-670 Tips and Tricks
  • Dustin on Eastern University MS in Data Science 2022 Review

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance humint intelligence intelligence analysis keokuk county language learning legal local government machine learning management peer support personal development politics professional development protective factors psychosocial risk factors safety planning sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training violence risk assessment youth
© 2022 Dustin K MacDonald | Powered by Minimalist Blog WordPress Theme