Intelligence Threat Handbook
Provides an unclassified reference handbook which explains the categories of intelligence threat, provides an overview of worldwide threats in each category, and identifies available resources for obtaining threat information. Contents: intelligence collection activities and disciplines (computer intrusion, etc.); adversary foreign intelligence operations (Russian, Chinese, Cuban, North Korean and Romanian); terrorist intelligence operations; economic collections directed against the U.S. (industrial espionage); open source collection; the changing threat and OPSEC programs.
What people are saying - Write a review
We haven't found any reviews in the usual places.
analysis bombing Bureau of Investigation China clandestine classiﬁed COMINT commercial Committee computer intruders conduct Counterintelligence countermeasures critical information databases Defense Department diplomatic Economic Espionage economic intelligence electronic ELINT facilities FAPSI Federal Bureau FISINT foreign intelligence services gather gence hackers HAMAS Hizballah HUMINT identiﬁed IMINT industrial espionage Intelligence Agency intelligence collection activities intelligence collection threat intelligence cycle intelligence operations intelligence organizations Interagency OPSEC Support IOSS Iran Islamic Judiciary Libyan ligence MASINT military monitor National Security North Korea obtain Ofﬁce oﬂicers Oleg Gordievsky open source collection open source information OPSEC process OPSEC program manager OPSEC Support Staff personnel proprietary data proprietary information Qods Force radar responsible Richelson Russian intelligence satellites scientiﬁc SIGINT Signals Intelligence signiﬁcant Soviet Union speciﬁc sponsored Sudan targeting the United technical technologies telecommunications terrorism terrorist terrorist attacks terrorist groups terrorist operations terrorist organizations tion unclassiﬁed Washington weapons
Page 4-1 - Investigation (FBI) defines terrorism as "the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives" (Federal Bureau of Investigation 1996, 3).
Page 2-1 - Bruce D. Berkowitz and Allan E. Goodman, Strategic Intelligence for American National Security (Princeton, NJ: Princeton University Press, 1989), 4. Notably, the last authors do not acknowledge the existence of "operational intelligence," which suggests a recent origin of the term, in the sense used in the present paper.
Page 4-4 - To this end, the study is sponsored jointly by the Office of the Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (OASD/SO/LIC) and the Office of the Under Secretary of State for Public Diplomacy and Public Affairs (DOS/R).
Page 4-2 - Studeman, stated, [Islamic] groups are even more dangerous in some ways than the traditional groups because they do not have a well-established organizational identity and they tend to decentralize and compartment their activities. They are also capable of producing more sophisticated conventional weapons as well as chemical and biological agents.
Page 3-13 - Christopher Andrew and Oleg Gordievsky, KGB: The Inside Story (New York: Harper Collins, 1990), pp. 239, 277-278, 305-306; Douglas L. Wheeler, "In the Service of Order: The Portuguese Political Police and the British, German, and Spanish Intelligence, 1932-1945," Journal of Contemporary History, XVIII (1983), pp.
Page 2-7 - Movement intentionally imparted to film at such a rate as to compensate for the forward motion of an air or space vehicle when photographing ground objects. imagery...
Page 4-10 - Has carried out terrorist attacks in 20 countries, killing or injuring almost 900 persons. Targets include the United States, the United Kingdom, France, Israel, moderate Palestinians, the PLO, and various Arab countries. Major attacks included the Rome and Vienna airports in December 1985...
Page 2-7 - ... derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same. Also called MASINT. 225 I I I S ¿4<,t7...
Page 4-10 - Location/Area of Operation Operates in the Bekaa Valley, the southern suburbs of Beirut, and southern Lebanon; has established cells in Europe, Africa, South America, North America, and elsewhere. External Aid Receives substantial amounts of financial, training, weapons, explosives, political, diplomatic, and organizational aid from Iran.