By Stratfor

No matter if safeguarding humans or locations, such a lot defense operations glance from the interior out, and all too frequently extra realization is paid to the "who" rather than the "how." yet a great defense application is carried out from the skin in, in keeping with motion instead of response. the belief is to target intelligence that may hinder the following assault from taking place. We confer with this proactive approach as protecting intelligence.

Show description

Read Online or Download How to Look for Trouble: A Stratfor Guide to Protective Intelligence PDF

Similar intelligence & espionage books

Courting Disaster: How the CIA Kept America Safe and How Barack Obama Is Inviting the Next Attack

White apartment speechwriter Marc Thiessen used to be locked in a safe room and given entry to the main delicate intelligence while he was once tasked to jot down President George W. Bush’s 2006 speech explaining the CIA’s interrogation software and why Congress should still authorize it. Few understand extra approximately those CIA operations than Thiessen, and in his new publication, dating catastrophe, he records simply how powerful the CIA’s interrogations have been in foiling assaults on the United States, penetrating al-Qaeda’s excessive command, and offering our army with actionable intelligence.

The Only Thing Worth Dying For: How Eleven Green Berets Forged a New Afghanistan

On a moonless evening simply weeks after September eleven, 2001, U. S. specific Forces staff ODA 574 infiltrates the mountains of southern Afghanistan with a possible very unlikely venture: to foment a tribal insurrection and strength the Taliban to give up. Armed completely with the apparatus they could keep it up their backs, shockingly scant intelligence, and their mastery of guerrilla conflict, Captain Jason Amerine and his males haven't any selection yet to belief their merely best friend, a little-known Pashtun statesman named Hamid Karzai who has again from exile and is being hunted by means of the Taliban as he travels the nation-state elevating a military.

Operation Snow: How a Soviet Mole in FDR's White House Triggered Pearl Harbor

Lately declassified facts and never-before-translated files inform the true tale of the day that FDR memorably declared may reside in infamy, exploring how Joseph Stalin and the KGB used an enormous community of double brokers and communist sympathizers—most particularly Harry Dexter White—to lead Japan into conflict opposed to the us, presenting Soviet involvement in the back of the bombing of Pearl Harbor.

Intelligence and Intelligence Analysis

This booklet tracks publish 9-11 advancements in nationwide safeguard and policing intelligence and their relevance to new rising components of intelligence perform similar to: corrections, biosecurity, deepest and regulatory environments. advancements are explored thematically throughout 3 wide sections: using intelligence figuring out constructions constructing a self-discipline.

Additional info for How to Look for Trouble: A Stratfor Guide to Protective Intelligence

Sample text

Focusing on the how, then, requires protective intelligence practitioners to carefully study the tactics, tradecraft and behavior associated with militant actors involved in terrorist attacks. This allows them to search for and identify those behaviors before an attack takes place. Many of these behaviors are not by themselves criminal in nature; visiting a public building and observing security measures or standing on the street to watch the arrival of a VIP at his or her office are not illegal acts, but they can be indicators that an attack is being plotted.

Al-Wahayshi, an ethnic Yemeni who spent time in Afghanistan serving as a lieutenant under Osama bin Laden, noted these simple attacks could be conducted with readily available weapons such as 39 How to look for Trouble knives, clubs or small improvised explosive devices (IEDs). ” That al-Wahayshi gave these instructions in an Internet magazine distributed via jihadist chat rooms, not in some secret meeting with his operational staff, demonstrates that they are clearly intended to reach grassroots jihadists — and are not intended as some sort of internal guidance for AQAP members.

When we have spoken with law enforcement officers responsible for investigating recent grassroots plots, they have given us blank stares in response to questions about how the suspects had conducted surveillance on the intended targets. They simply had not paid attention to this type of detail — but this oversight is not really the investigators’ fault. No one had ever explained to them why paying attention to, and recording, this type of detail was important. Moreover, it takes specific training and a practiced eye to observe and record these details without glossing over them.

Download PDF sample

Rated 4.42 of 5 – based on 16 votes