The final module is Unit Threat Assessment. This follows the same procedures as the previous module but focuses on the elements relevant to personnel in particular, rather than to installations. While bombings or mortar attacks might be threats more relevant to installations, kidnappings are more relevant to individual soldiers. Because there is no major differences…
Tag: training
Threat Assessment of Military Installations ICT2B03L
This module focuses on the practical elements of conducting a threat assessment for a military installation. Threat assessment is broken down into five phases: Study the Adversary Study the Support Element Assessment Recommendations Writing the Report Phase I – Study the Adversary Elements to explore include: The enemy’s security and intelligence apparatus Conventional forces (in…
Analysis Automation ICT2B02L
The Analysis Automation discusses the “Crime Link” tool used for association matrixes and link analysis. Most intelligence analysis software (e.g. Analyst’s Notebook from i2 Software, now owned by IBM) can be used to produce these types of analyses. I can’t find any information online about this tool so I’m unsure if it’s proprietary to the…
Analytical Methods of Investigating Terrorism 13ICTXP9
This module discusses three analytical techniques for determining terrorist group linkages, capabilities and intentions. The three items that they identify are: Time-Event Charts Association and Activity Matrixes Link Diagram Time-event charts are the simple coded charts that depict a timeline of a terrorist attakc. For more information, see the activity matrix page. Association matrix, activity…
Personal Protection Against Terrorism ICT2A09L
This module provides a variety of safety measures for personal protection, especially overseas. This module is a small version of the MCRP 3-02E Individual’s Guide for Understanding and Surviving Terrorism. Rather than duplicate the material in that book, I will link to the Personal Protective Measures Against Terrorism from the 21st Theater Support Command as…