Dustin K MacDonald

Menu
  • Home
  • About
  • Economic and Community Development
  • Nonprofit Management
    • Counselling and Service Delivery
    • Suicide Prevention / Crisis Intervention
  • Politics and Governance
  • Math and Statistics
  • Salesforce
Menu

Intelligence Support in Combatting Terrorism ICT2A08L

Posted on September 25, 2018November 23, 2019 by Dustin

This module contains some basic information on intelligence sources. Intelligence sources such as Imagery Intelligence, Human Intelligence and Signals Intelligence are identified, while some basic tenets of intelligence dissemination are discussed.

Some goals of intelligence analysis are also discussed. These items are better dealt with by the specific articles that cover their topics, including my list of intelligence analysis techniques.

Counterintelligence is defined (US Army, 1993):

Information gathered and activities conducted to protect against espionage and other clandestine activities, sabotage, international terrorist activities or assassinations

The goals of counterintelligence include detecting foreign forces intelligence activities (both overt and covert), and Counterintelligence Force Protection Source Operations (CFSO). The US Army Field Manual 34-60 Counterintelligence (1995) defines CFSO as:

human source operations, normally clandestine in nature, conducted abroad that are intended to fill the existing gap in national level coverage, as well as satisfying the combatant commander’s intelligence requirements

Essential Elements of Information (EEI) are discussed. These are “the most critical information requirements regarding the adversary and the OE needed by the commander to assist in reaching a decision” (US Army, 2013)

EEI answers the basic questions about terrorist attacks including:

  • What was attacked and when
  • Are the enemies known?
  • Did they use weapons?
  • Have they taken hostages? What are their demands?
  • Where would they be most likely to flee?

And other elements in order to begin mounting an effective response and add to one’s knowledge base for future analysis.

Threat Assessment

Six factors are identified in this module for conducting threat assessments. They are:

  1. Existence – Does a threat from a terrorist group actually exist in a specific area?
  2. Capability – What is this group realistically capable of accomplishing?
  3. Intentions – Of the things they can do, what are they interested in actually doing?
  4. History – This is more bibliographic and detailed information about the history of the group. Past activities and motivations will likely continue in the future
  5. Targeting – Targeting refers specifically to the groups’s section of targets historically and who or what targets might be selected in the future
  6. Security Environment – This involves looking at the terrorist group vulnerabilities or weaknesses that can be exploited

Threat assessment is a complicated subject best covered in its own article. Please see my article on Threat Assessment in Education for an introduction to one subset of this topic.

Force Protection Conditions

Force protection, defined as “preventive actions and responses to terrorist threats against U.S. personnel and facilities” (DoD, 2006) involves a variety of measures to harden military targets (including physical structures and personnel) from attack.

There are five level of Force Protection Condition (FP CON; DoD, 2007):

  • Force Protection Normal, when there is no known or suspected threats. Examples of force protection measures at this level are random spot checks of vehicles and personnel entering military facilities.
  • Force Protection Alpha, when there is the possibility of terrorist activity. Examples of force protection measures at this level are briefing individuals to report suspicious activity and testing the mass notification system.
  • Force Protection Bravo, an increased, predictable threat of terrorist activity. Force protection activities at this level include inspecting the facility at regular intervals for suspicious packages and searching vehicles (especially large ones) entering the facility for IEDs.
  • Force Protection Charlie, a specific, imminent threat exists. At this level, force protection activities include limiting access to food and water storage and distribution centers.
  • Force Protection Delta, a localized, specific imminent threat exists. At this level, all vehicles within the operational area will be identified and all briefcases or other storage items are searched upon entry to the facility

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Privacy Policy

See here for our privacy policy. This site uses affiliate links and Adsense ads to provide targeted advertising.

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance humint intelligence intelligence analysis keokuk county language learning legal local government management peer support personal development politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training violence risk assessment youth

Recommended Posts

  • Conducting Psychosocial Assessments
  • DCIB Model of Suicide Risk Assessment
  • ABC Model of Crisis Intervention
  • My Friend is Suicidal - What do I do?

Recent Posts

  • ITS834 Emerging Threats and Countermeasures
  • Salesforce Flow that autonames records
  • Salesforce formula that calculates age
  • Earning the Project Management Professional (PMP)
  • ITS831 Information Technology Importance in Strategic Planning

Archives

  • September 2023 (3)
  • August 2023 (1)
  • July 2023 (1)
  • May 2023 (1)
  • March 2023 (1)
  • February 2023 (2)
  • January 2023 (4)
  • December 2022 (2)
  • May 2022 (1)
  • April 2022 (2)
  • March 2022 (1)
  • February 2022 (1)
  • December 2021 (1)
  • October 2021 (1)
  • August 2021 (2)
  • May 2021 (3)
  • December 2020 (1)
  • November 2020 (4)
  • July 2020 (1)
  • June 2020 (1)
  • April 2020 (1)
  • March 2020 (4)
  • February 2020 (7)
  • January 2020 (1)
  • November 2019 (1)
  • October 2019 (2)
  • September 2019 (4)
  • August 2019 (2)
  • March 2019 (1)
  • February 2019 (1)
  • January 2019 (1)
  • December 2018 (4)
  • November 2018 (3)
  • October 2018 (3)
  • September 2018 (19)
  • October 2017 (2)
  • September 2017 (2)
  • August 2017 (1)
  • July 2017 (39)
  • May 2017 (3)
  • April 2017 (4)
  • March 2017 (4)
  • February 2017 (4)
  • January 2017 (5)
  • December 2016 (4)
  • November 2016 (4)
  • October 2016 (5)
  • September 2016 (4)
  • August 2016 (5)
  • July 2016 (5)
  • June 2016 (5)
  • May 2016 (3)
  • April 2016 (2)
  • March 2016 (2)
  • February 2016 (2)
  • January 2016 (4)
  • December 2015 (2)
  • November 2015 (2)
  • October 2015 (2)
  • September 2015 (2)
  • August 2015 (1)
  • June 2015 (2)
  • May 2015 (5)
  • April 2015 (3)
  • March 2015 (8)
  • February 2015 (12)
  • January 2015 (28)

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • ITS834 Emerging Threats and Countermeasures. - Dustin K MacDonald on University of the Cumberlands PhD in Information Technology
  • Earning the Project Management Professional (PMP) - Dustin K MacDonald on University of the Cumberlands PhD in Information Technology
  • Dustin on How I Got a Book Contract
  • Ananth on How I Got a Book Contract
  • Aly on Improving Your Helpline Work

Tags

analytical technique assessment city council communication community development counselling crisis chat crisis intervention data science eastern university economic development education empathy evaluation forecasting fundraising governance humint intelligence intelligence analysis keokuk county language learning legal local government management peer support personal development politics professional development protective factors psychosocial risk factors safety planning salesforce sigourney social media statistics suicide suicide assessment suicide risk assessment technology terrorism training violence risk assessment youth
© 2023 Dustin K MacDonald | Powered by Minimalist Blog WordPress Theme