Intelligence Espionage

Assessing Irregular Warfare: A Framework for Intelligence by Eric V. Larson, Derek Eaton, Brian Nichiporuk, Thomas S.

By Eric V. Larson, Derek Eaton, Brian Nichiporuk, Thomas S. Szayna

Offers an analytic framework and strategy for the intelligence research of abnormal conflict (IW) environments which can function the foundation for IW intelligence curriculum improvement efforts. Defines IW when it comes to stylized events: population-centric (such as counterinsurgency) and counterterrorism. offers an in depth overview of IW-relevant safety coverage and technique files and an inventory of correct doctrinal guides.

Show description

Read Online or Download Assessing Irregular Warfare: A Framework for Intelligence Analysis PDF

Best intelligence & espionage books

Building Partner Capabilities For Coalition Operations

Ongoing operations and rising project standards position a heavy burden on military assets, leading to power gaps that the military is not able to fill on its own. One resolution is to construct the best functions in allies and accomplice armies via centred safety cooperation. to do that, military planners want a extra accomplished figuring out of the potential gaps and a method for matching these gaps with candidate companion armies.

Our Man in Yugoslavia (Studies in Intelligence)

As a completely documented research of a moment global struggle mystery Intelligence carrier (SIS) operative, Our guy in Yugoslavia is de facto specified. Its topic is Owen Reed, a military officer recruited into SIS in the summertime of 1943 after which parachuted in to German-occupied Croatia to paintings with Tito's Partisans and different Allied mystery enterprises.

SAS Ultimate Guide to Combat: How to Fight and Survive in Modern Warfare

'I'm not likely to coach you the way to outlive in snowy mountains with just a tea bag; this ebook will educate you ways to struggle and live to tell the tale conflict within the twenty first century. '--Robert Stirling, from the IntroductionIn the culture of John 'Lofty' Wiseman's SAS Survival guide comes a brand new wrestle instruction manual from a professional speical forces soldier.

The World Was Going Our Way: The KGB and the Battle for The Third World, Vol. 2

In 1992 the British mystery Intelligence carrier exfiltrated from Russia a defector whose presence within the West remained a mystery till the book of The Sword and the safeguard in 1999. That guy used to be Vasili Mitrokhin, the KGB's so much senior archivist. Unknown to his superiors, Mitrokhin had spent over a decade making notes and transcripts of hugely categorised records which, at huge, immense own possibility, he smuggled out of the KGB data.

Extra info for Assessing Irregular Warfare: A Framework for Intelligence Analysis

Example text

Tellis, “Introduction,” in Thomas S. : RAND Corporation, 2000, pp. 3, 5. 34 Assessing Irregular Warfare: A Framework for Intelligence Analysis policy entrepreneurs who seek to exploit dissatisfaction, increased resources and improved organization, and external assistance. t Assess state capability. In this step, the analyst assesses the state’s political capacity to accommodate aggrieved stakeholder groups, its fiscal capacity to compensate them, and its coercive capacity to suppress them. t Forecast likelihood of violence.

10. 18 IW JOC 9/07, p. 10. 19 The most comprehensive—and because it has now been approved, authoritative—list of activities and missions, moreover, is to be found in IW JOC 9/07. , foreign internal defense, SSTRO, and counterterrorism operations); and (2) counterterrorism operations, whether conducted in the context of a larger counterinsurgency or other campaign or conducted independent of such operations as part of SOCOM’s campaign for the war on terrorism. Irregular Warfare Common Logical Lines of Operation We also reviewed doctrinal and other documents to see how subordinate activities of IW operations might be binned as LLOs.

In network vernacular, a resource may also be referred to as a “node” 27 NMSP-WOT 2/06, p. 4. ”28 NMSP-WOT 2/06 helpfully provides a categorization of the elements of a terrorist network that is meant to serve “as a common lexicon for orienting and coordinating efforts against enemy networks,” and as a framework for the analysis of a network’s critical elements for operation and survival. Although this thinking is not yet enshrined in doctrine, it may nevertheless represent a starting point for counterterrorism analysis.

Download PDF sample

Rated 4.00 of 5 – based on 23 votes