Introduction
Intelligence in Combating Terorrism (ICT), also known by its course identifier 3C-F14/244-F8, is a course produced by the US Army Intelligence Center and School located at Fort Huachuca, AZ. (US Army Intelligence School, n.d.) It is a ten unit course that aims to teach the basics of how to leverage intelligence to understand and combat terrorism. This course is one of three courses used to train new military intelligence analysts. (Stemler, 2004, p. 12)
The course, as available online, includes an Instructor’s Manual that lists the learning outcomes, instructor’s notes, and content that should be covered during each slide.
The ten modules are listed below. Click each one to access the article on that module and download the full module from the Reimer Digital Library.
- Contemporary Terrorism ICT2A03L
- Development Operations ICT2A04L
- Ideologies and Motivations ICT2A06L
- Anatomy of a Terrorist Incident ICT2A07L
- Intelligence Support in Combatting Terrorism ICT2A08L
- Personal Protection Against Terrorism ICT2A09L
- Analytical Methods of Investigating Terrorism 13ICTXP9
- Analysis Automation ICT2B02L
- Threat Assessment of Military Installations ICT2B03L
- Unit Threat Assessment ICT2B04L
References
This bibliography refers to references found throughout all 10 modules.
Anti-Defamation League (ADL). (2005) “Christian Identity” Retrieved on August 21, 2016 from http://archive.adl.org/learn/ext_us/christian_identity.html
CNN Wire. (2011, May 9) “Obama says bin Laden had ‘support network’ in Pakistan”. Retrieved on August 19, 2016 from http://edition.cnn.com/2011/POLITICS/05/08/pakistan.us.relations/
Bejan, V., & Parkin, W. S. (2015). Examining the effect of repressive and conciliatory government actions on terrorism activity in Israel. Economics Letters, 55. doi:10.1016/j.econlet.2015.05.016
Bolton, J.R. (2015, Dec 31.) “Terrorism is the symptom, ideology the disease”. The Boston Globe. Retrieved on August 21, 2016 from https://www.aei.org/publication/terrorism-is-the-symptom-ideology-the-disease/
Byman, D. (2004) “Passive Sponsorship of Terrorism” Retrieved on August 19, 2016 from http://web.mit.edu/ssp/seminars/wed_archives04fall/byman.htm
Celmer, M.A. (1987) Terrorism, U.S. Strategy, and Reagan Policies. Westport, Connecticut: Greenwood Press.
Daily Record (Glasgow, Scotland). (2016, Jun. 7). RIGHT WING TERROR; EURO 2016 PLOT NEO-NAZI PLANNED BLOODBATH IN FRANCE Five Kalashnikovs, 5000 bullets, two anti-tank grenade launchers, 125kg of TNT, 100 detonators and 20 balaclavas.
da Silva, R.C. (2014) Responding to terror-related kidnapping: a torn Western reaction. Human Rights and Conflict Resolution. 3(6). Human Security Centre. Retrieved on August 21, 2016 from http://www.hscentre.org/middle-east-and-north-africa/responding-terror-related-kidnapping-torn-western-reaction/
Department of Defense (DoD). (2006) “DoD Antiterrorism (AT) Standards.” Retrieved on August 21, 2016 from http://www.dtic.mil/whs/directives/corres/pdf/200016p.pdf
Department of Defense. (2007) Department of Defense Education Activity Antiterrorism Program and Standards. Retrieved on August 21, 2016 from http://www.dodea.edu/Offices/Regulations/loader.cfm?csModule=security/getfile&pageid=92517
Federal Bureau of Investigation (FBI). (2001) “Terrorism | National Institute of Justice”. Retrieved on August 19, 2016 from http://www.nij.gov/topics/crime/terrorism/pages/welcome.aspx
Federal Bureau of Investigation (FBI). (2005) “Terrorism 2002 – 2005”. Retrieved on August 19, 2016 from https://www.fbi.gov/file-repository/stats-services-publications-terrorism-2002-2005-terror02_05.pdf
Harris-Hogan, S. (2013). Anatomy of a terrorist cell: A study of the network uncovered in Sydney in 2005. Behavioral Sciences Of Terrorism And Political Aggression, 5(2), 137-154. doi:10.1080/19434472.2012.727096
Knickerbocker, B. (2015, Apr. 18) “Oklahoma City bombing: Right-wing extremist threat 20 years later (+video)” The Christian Science Monitor. Retrieved on August 20, 2016 from http://www.csmonitor.com/USA/Justice/2015/0418/Oklahoma-City-bombing-Right-wing-extremist-threat-20-years-later-video
Mauro, R. (2014) “Understanding Islamist Extremism. The Clarion Project. Retrieved on August 21, 2016 from http://www.clarionproject.org/understanding-islamism/islamic-extremism
Prescott, B. (2010) “An Accurate Look at Timothy McVeigh’s Beliefs” EthicsDaily. Retrieved on August 20, 2016 from http://www.ethicsdaily.com/an-accurate-look-at-timothy-mcveighs-beliefs-cms-15532
State Department. (2001) “Executive Order 13224” Retrieved on August 19, 2016 from http://www.state.gov/j/ct/rls/other/des/122570.htm
Seger, K.A. (2001) Left-Wing Extremism: The Current Threat. Center for Human Reliability Studies. Retrieved on August 21, 2016 from https://fas.org/irp/world/para/left.pdf
Stemler, G. (2004) Overview of MI Initial Entry Training Courses Taught By the 309th MI Battalion. Military Intelligence Professional Bulletin. (30)2. Retrieved on August 18, 2016 from https://fas.org/irp/agency/army/mipb/2004_02.pdf
Stratfor. (2012) Defining the Terrorist Attack Cycle. Retrieved on August 21, 2016 from https://www.stratfor.com/image/defining-terrorist-attack-cycle
US Army Intelligence School. (n.d.) “Intelligence in Combating Terrorism (ICT) Course”. Retrieved on August 19, 2016 from https://rdl.train.army.mil/catalog-ws/view/100.ATSC/DAFE4E3C-4079-413C-8C7E-3F71D6CC6501-1274121137112/ICT/ICT.htm?trk=profile_certification_title
US Army. (1993) “AR 381-20 The Army Counterintelligence Program”. Retrieved on August 21, 2016 from https://fas.org/irp/doddir/army/ar381-20.pdf
US Army. (1995) “Field Manual 34-60 Counterintelligence” Retrieved on August 21, 2016 from https://www.aclu.org/files/projects/foiasearch/pdf/DODDOA006278.pdf
US Army. (2002) “Army Regulation 525–13 Antiterrorism”. Retrieved on August 19, 2016 from http://download.cabledrum.net/wikileaks_archive/file/ar-525-13–2002-1.pdf
US Army. (2013) “JP2-0 Joint Intelligence”. Retrieved on August 21, 2016 from http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf
Vohryzek-Bolden, M., Olson-Raymer, G. & Whamond, J.O. (2001) Special-Interest Extremists and Terrorists (From Domestic Terrorism and Incident Management: Issues and Tactics, pp. 140-172.
Westcott, K. (2013) “What is Stockholm syndrome?” BBC News Magazine. Retrieved on August 21, 2016 from http://www.bbc.com/news/magazine-22447726