7133 Trouble V4.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

7133 Trouble V4.Pdf HOW TO LOOK FOR TROUBLE A STRATFOR Guide to Protective Intelligence S t r at for Global Intelligence STRATFOR 700 Lavaca Street, Suite 900 Austin, Texas 78701 Copyright © 2010 by STRATFOR All rights reserved, including the right of reproduction in whole or in part Printed in the United States of America The contents of this book originally appeared as analyses on STRATFOR’s subscription Web site. ISBN: [?] EAN-13: [?] Publisher: Grant Perry Editor: Michael McCullar Project Coordinator: Robert Inks Designer: TJ Lensing COntenTs Introduction v ANoteonContent ix CHapter 1: PrinCiples and CHallengEs TheProblemoftheLoneWolf 1 TheSecretsofCountersurveillance 8 Threats,SituationalAwarenessandPerspective 14 IntelligenceasaProactiveTool 19 CounterterrorismFunding:OldFearsandCyclical Lulls 25 AQAP:ParadigmShiftsandLessonsLearned 31 Counterterrorism:Shiftingfromthe‘Who’tothe ‘How’ 39 Profiling:SketchingtheFaceofJihadism 46 CHapter 2: The Art of SurvEillance Surveillance:ForGood—andEvil 53 TheSpreadofTechnicalSurveillance 55 PhysicalSurveillance:TailingSomeoneontheMove 57 PhysicalSurveillance:TheArtofBlendingIn 60 TurningtheTablesonSurveillants 62 iii Table of Contents CHapter 3: Protecting People Bhutto’sDeath:FatalFactors 67 India:AKidnappingCaseStudy 70 China:SecurityAspectsoftheDalaiLama’sTravels 73 TheU.S.ElectionSeason:SecurityChallengesand ConventionalWisdom 75 Mexico:ExaminingtheCartelWarThrougha ProtectiveLens 80 Mexico:TacticalImplicationsoftheLabastida Killing 87 Mexico:TheThirdWar 89 CHapter 4: SafegUaRding Places CorporateSecurity:TheTechnologyCrutch 97 IncidentForeshadowsFutureAttacksinPakistan 102 ProtectiveIntelligenceAssessment:TheIslamabad MarriottBombing 109 ImplicationsoftheManawanAttack 112 SecurityatPlacesofWorship:MoreThanaMatter ofFaith 119 ExaminingtheJakartaAttacks:Trendsand Challenges 126 Convergence:TheChallengeofAviationSecurity 135 iv introductiOn Protectiveintelligence(PI)isaconceptweadoptedandrefined while working as special agents in the counterterrorism investiga- tions division of the U.S. State Department’s Diplomatic Security Service.Whenagentsfromourofficeweredispatchedtoinvestigate anincidentsuchasanembassybombing,assassinationorkidnapping, oureffortswerefocusednotonlyondeterminingwhoconductedthe attackbutalsoongatheringalltheminutedetailsofhowtheattack wasconducted.TheideabehindPI,simplyenough,istofocuson intelligencethatwillhelppreventthenextattackfromoccurring. Determining who was responsible for conducting an attack is important,especiallyifthereistobesomesortofmilitaryoperation directedagainsttheguiltypartyoranattempttobringtheperpe- tratortojusticeinacourtoflaw.Butfocusinginvestigativeefforts solelyonidentifyingtheperpetratorisnotalwaysusefulinprevent- ingfutureattacksandsavinglives,whichisthegoalofPI. Practitionersofprotectiveintelligencecarefullystudythetactics, tradecraft and behavior associated with militant actors involved in terroristattacks,threateningcriminalsandthementallydisturbed— anyone,really,wantingtodoharmtosomeoneelse.Byunderstanding howattacksareconducted—i.e.,theexactstepsandactionsrequired forasuccessfulattack—measurescanthenbetakentoproactively identify early indicators that planning for an attack is under way. Evenbeforeitisknownwhoisinvolvedintheactivity,thefactthat someoneisundertakingsucheffortscanbeidentified. Thisisanimportantcapabilityinthecurrentterroristenviron- ment,wherelonewolvesandsmallcellscomprisesuchalargeportion v How to look forTrouble ofthethreatspectrum.Oncesuchindicatorsofsuspiciousbehavior are noted, the people involved in planning the attack can then be focusedonandidentifiedandactioncanbetakentopreventthem from conducting the attack or attacks they are plotting. Studying thehowofanattackalsoallowsonetoobservethevulnerabilitiesin securitymeasuresthatwereexploitedbytheattackersandpermits securitymeasurestobealteredaccordinglytopreventsimilarattacks inthefuture. PIisbasedonthefactthatattacksdon’tjusthappenoutofthe blue.Mostfollowadiscernibleattackcycleinwhichtherearecriti- calpointswhenaplotismostlikelytobedetectedbyanoutside observer.Two of these points are when surveillance is being con- ductedandweaponsarebeingacquired.However,thereareother,less obviouspointswhenpeopleonthelookoutcanspotpreparationsfor anattack.Itistruethatindividualssometimesconductill-conceived, poorlyexecutedattacksthatinvolveshortcutsintheplanningpro- cess,butthistypeofspur-of-the-momentattackisusuallyassoci- atedwithmentallydisturbedindividuals,anditisextremelyrarefor a militant actor or professional criminal to conduct a spontaneous terroristattackwithoutfirstfollowingthestepsoftheattackcycle. Toreallyunderstandthenutsandboltsofanattack,PIpracti- tionerscannotsimplyacknowledgethatsomethinglikesurveillance occurs.Itiscriticaltounderstandexactlyhowthesurveillanceiscon- ducted.PIpractitionersmustturnapowerfullensonattackelements likepreoperationalsurveillancetogainanin-depthunderstandingof itandallthebehaviorsandoperationalelementsthatgoalongwith the process. Dissecting an activity like preoperational surveillance requiresmorethansimplyexaminingsubjectssuchasthedemeanor demonstratedbythoseconductingsurveillancepriortoanattackand thespecificmethodsandcoverforactionandcoverforstatusused.It alsorequiresidentifyingparticulartimeswheresurveillanceismost likelyandtheoptimalvantagepoints(called“perches”insurveillance jargon)fromwhereasurveillantismostlikelytooperatewhenmoni- toringaspecificfacilityorevent.Thistypeofcomplexunderstanding vi Introduction ofsurveillancecanthenbeusedtohelpfocushumanortechnological countersurveillanceeffortswheretheycanbemosteffective. Unfortunately,manycounterterrorisminvestigatorsaresofocused onidentifyingtheperpetratorthattheydonotfocusoncollecting this type of granular“how” information. Prosecution is the prior- ityinsteadofprevention.Whenwehavespokenwithlawenforce- ment officers responsible for investigating recent grassroots plots, theyoftenhavegivenusblankstaresinresponsetoquestionsabout howthesuspectsconductedsurveillanceontheintendedtargets.Too many investigators are not drilling down into specificity regarding surveillance.Thisisanintelligencefailure.Toooften,theysimplydo notpayattentiontothistypeofdetail.Butthisoversightisnotreally theinvestigators’fault.Noonehaseverexplainedtothemwhypaying attentionto,andrecording,thistypeofdetailisimportant. Moreover,ittakesspecifictrainingandapracticedeyetoobserve andrecordthesedetailswithoutglossingoverthem.Forexample,it isquiteusefulifaprotectiveintelligenceofficerhasfirstconducted alotofsurveillance,becauseconductingsurveillanceallowsoneto understandwhatasurveillantmustdoandwherehemustbeinorder toeffectivelyobserveaspecificpersonorplace. Militantsandcriminalsconductingattacksandsecurityperson- nelattemptingtoguardagainstsuchattackshavelongengagedin atacticalgameofcatandmouse.Asmilitantsandcriminalsadopt newtactics,securitymeasuresarethenimplementedtocounterthose tactics.Thesecuritychangesthencausetheattackerstochangein response and the cycle begins again. However, the basic tools of protectiveintelligence,oncemastered,allowtheinvestigatororana- lyst to spot trends and shifting paradigms as they develop.This is whatallowedSTrATFOrtodiscussthedangersofalQaedainthe ArabianPeninsula’sinnovativebombdesigns(andthepotentialfor their employmentagainstaircraft)inSeptember2009, well before theChristmasDayattackagainstNorthwestAirlinesflight253. BecomingaseasonedPIpractitionertakesyearsandalotofprac- ticalexperience,butalmostanyonecantakethebasicprinciplesof protectiveintelligenceandemploythemeffectivelytospotsuspicious vii How to look forTrouble behavior.Oneofthegrandsecretswewanttoshareisthatwhenit comestoterroristandcriminaltradecraft,thebadguysarenotreally asgoodasthepublicisledtobelieve.Theyareoftenawkwardand makemistakes.Oneofthebigfactorsthatallowthemtosucceedis thatnobodyislookingforthem.Whentheyare“watchedback,”the likelihoodoftheirmissionsucceedingisdramaticallyreduced. ScottStewart,VP,TacticalIntelligence FredBurton,VP,Counterterrorism STrATFOr Austin,Texas Feb.12,2010 viii a Note On COntenT STrATFOr presents the following reports as they originally appeared on our subscription Web site, www.STrATFOr.com. Thesepiecesrepresentsomeofourbesttutorialsrelatedtoprotective intelligence since December 2005, organized under chapter head- ingsandpresentedintheorderinwhichtheywerepublished.Since mostofthearticleswerewrittenasindividualanalyses,theremay beoverlapfrompiecetopieceandchaptertochapter,andsomeof the information may seem dated. Naturally, some observations are linkedtoaspecifictimeoreventyearsremovedfromtoday’ssecurity environment,whichcontinuestoevolve,buttherecommendations andprinciplesareeverybitasrelevanttodayastheywerewhenthey werewritten. ix CHapter 1: PrinCiples and CHallengEs TheProblemoftheLoneWolf May 30, 2007 Historically,gunmenandbomberswhoactontheirown—lone wolves—haveposedasignificantthreatintheUnitedStates.Indeed, fromtheassassinationofPresidentAbrahamLincolntotheslaying ofmusiclegendJohnLennontheyhavepresentedafarmoredeadly threattoprominentpeopleintheUnitedStatesthanhavemilitant groups. Additionally, as demonstrated by cases such as the 1991 Luby’srestaurantshootinginKilleen,Texas,ortherecentVirginia Techmassacre,theyalsoposeagravedangertoordinaryAmericans. Duetotheiroftensolitary,withdrawnnature,lonewolvespresent uniqueproblemsforsecurityandlawenforcement,astheirveryqual- itiesmakeithardforlawenforcementorprotectivesecuritydetailsto gatherintelligenceregardingtheirintentions.However,theyarenot impossibletoguardagainst.Lonewolvesfrequentlytakeactionsin advanceofanattackthatmakethemvulnerabletodetectionbyapro-
Recommended publications
  • Trends Toward Real-Time Network Data Steganography
    TRENDS TOWARD REAL-TIME NETWORK DATA STEGANOGRAPHY James Collins, Sos Agaian Department of Electrical and Computer Engineering The University of Texas at San Antonio, San Antonio, Texas, USA [email protected], [email protected] Abstract Network steganography has been a well-known covert data channeling method for over three decades. The basic set of techniques and implementation tools have not changed significantly since their introduction in the early 1980’s. In this paper, we review the predominant methods of classical network steganography, describing the detailed operations and resultant challenges involved in embedding data in the network transport domain. We also consider the various cyber threat vectors of network steganography and point out the major differences between classical network steganography and the widely known end-point multimedia embedding techniques, which focus exclusively on static data modification for data hiding. We then challenge the security community by introducing an entirely new network data hiding methodology, which we refer to as real-time network data steganography. Finally, we provide the groundwork for this fundamental change of covert network data embedding by introducing a system-level implementation for real-time network data operations that will open the path for even further advances in computer network security. KEYWORDS Network Steganography, Real-time Networking, TCP/IP Communications, Network Protocols 1. INTRODUCTION Even though the origins of steganography reach back to the time of ancient Greece, to Herodotus in 440 BC, the art of steganography continues to evolve. This is especially true in the technical methods of digital embedding [1][2]. Digital steganography has been used since the early 1980’s and network steganography techniques quickly evolved with the advent of the Internet and standardized multimedia formats used for data exchange [3].
    [Show full text]
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • Emergency Operations Center How-To Quick Reference Guide August 2021
    National Incident Management System Emergency Operations Center How-To Quick Reference Guide August 2021 This page intentionally left blank Table of Contents Introduction .................................................................................................................................. 9 1. Purpose ...................................................................................................................................... 9 1.1. NIMS Compliance and Integration ................................................................................. 9 What Is an EOC? ........................................................................................................................ 10 1. Hallmarks of an EOC ............................................................................................................... 10 Preliminary Assessments .......................................................................................................... 12 1. Hazard and Vulnerability Assessment .................................................................................... 12 2. Resilience Analysis and Planning Tool ................................................................................... 12 3. Capability Assessment ............................................................................................................ 13 3.1. Interagency Coordination ............................................................................................. 13 3.2. Multiagency Coordination Groups ..............................................................................
    [Show full text]
  • CBEST Threat Intelligence-Led Assessments
    Implementation guide CBEST Threat Intelligence-Led Assessments January 2021 CBEST Threat Intelligence-Led Assessments 1 Forward Operational disruption can impact financial stability, threaten the viability of individual firms and financial market infrastructures (FMIs), or cause harm to consumers and other market participants in the financial system. Firms and FMIs need to consider all of these risks when assessing the appropriate levels of resilience within their respective businesses. Dealing with cyber risk is an important element of operational resilience and the CBEST framework is intelligence-led penetration testing which aims to address this risk. CBEST is part of the Bank of England and Prudential Regulation Authority’s (PRA’s) supervisory toolkit to assess the cyber resilience of firms’ important business services. This prioritised and focused assessment allows us and firms to better understand weaknesses and vulnerabilities and take remedial actions, thereby improving the resilience of systemically important firms and by extension, the wider financial system. Continued use of CBEST has confirmed its use as a highly effective regulatory assessment tool, which can now also be conducted on a cross-jurisdictional basis, in collaboration with other international regulators and frameworks. This latest version of the CBEST Implementation Guide builds upon the previous framework and contains improvements learned from the extensive testing which has taken place. In particular, we have analysed and implemented changes with the aim of clarifying CBEST roles and responsibilities as well as regulatory expectations for different CBEST activities. While the underlying intelligence-led penetration testing approach remains the same, we have reviewed and updated the technical guidance for most activities, prepared new templates (eg Penetration Testing Report) and incorporated important references to cross-jurisdictional assessments.
    [Show full text]
  • Espionage Against the United States by American Citizens 1947-2001
    Technical Report 02-5 July 2002 Espionage Against the United States by American Citizens 1947-2001 Katherine L. Herbig Martin F. Wiskoff TRW Systems Released by James A. Riedel Director Defense Personnel Security Research Center 99 Pacific Street, Building 455-E Monterey, CA 93940-2497 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704- 0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DDMMYYYY) 2. REPORT TYPE 3. DATES COVERED (From – To) July 2002 Technical 1947 - 2001 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER 5b. GRANT NUMBER Espionage Against the United States by American Citizens 1947-2001 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER Katherine L. Herbig, Ph.D. Martin F. Wiskoff, Ph.D. 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8.
    [Show full text]
  • MISSILE DEFENSE Further Collaboration with the Intelligence Community Would Help MDA Keep Pace With
    United States Government Accountability Office Report to Congressional Committees December 2019 MISSILE DEFENSE Further Collaboration with the Intelligence Community Would Help MDA Keep Pace with Emerging Threats GAO-20-177 December 2019 MISSILE DEFENSE Further Collaboration with the Intelligence Community Would Help MDA Keep Pace with Highlights of GAO-20-177, a report to Emerging Threats congressional committees Why GAO Did This Study What GAO Found MDA is developing missile defense The Missile Defense Agency (MDA) is experiencing delays getting the threat capabilities to defend the United assessments needed to inform its acquisition decisions. Officials from the States, deployed forces, and regional defense intelligence community—intelligence organizations within the allies from missile attacks. However, Department of Defense (DOD)—told GAO this is because they are currently missile threats continue to emerge, as overextended due to an increased demand for threat assessments from a adversaries continue to improve and recent upsurge in threat missile activity, as well as uncertainties related to their expand their missile capabilities. transition to new threat processes and products. The delays are exacerbated The National Defense Authorization because MDA does not collectively prioritize the various types of threat Act for Fiscal Year 2012 included a assessment requests submitted to the defense intelligence community or provision that GAO annually assess provide resources for unique requests, as other major defense acquisition and report on the extent to which MDA programs are generally required to do. Without timely threat assessments, has achieved its acquisition goals and MDA risks making acquisition decisions for weapon systems using irrelevant objectives, and include any other or outdated threat information, which could result in performance shortfalls.
    [Show full text]
  • The FBI's Counterterrorism Program
    U.S. Department of Justice Federal Bureau of Investigation Report to the National Commission on Terrorist Attacks upon the United States: The FBI’s Counterterrorism Program Since September 2001 April 14, 2004 Report to The National Commission on Terrorist Attacks upon the United States The FBI’s Counterterrorism Program Since September 2001 TABLETABLE OF OFCONTENTS CONTENTS I EXECUTIVE SUMMARY....................................................................11 II FBI ORGANIZATIONAL CHART................................................. 3 III TIMELINE OF SIGNIFICANT REFORMS AND INITIATIVES SINCE 9/11/01.......................................................... 4 IV INTRODUCTION......................................................................................66 V PRIORITIZATION....................................................................................77 The New Priorities.........................................................................................77 1 Protect the United States from Terrorist Attack..........................................77 2 Protect the United States Against Foreign Intelligence Operations and Espionage........................................................................................77 3 Protect the United States Against Cyber-based Attacks and High-Technology Crimes..................................................................88 4 Combat Public Corruption at all Levels.......................................................88 5 Protect Civil Rights......................................................................................88
    [Show full text]
  • International Spy Museum
    International Spy Museum Searchable Master Script, includes all sections and areas Area Location, ID, Description Labels, captions, and other explanatory text Area 1 – Museum Lobby M1.0.0.0 ΚΑΤΆΣΚΟΠΟΣ SPY SPION SPIJUN İSPİYON SZPIEG SPIA SPION ESPION ESPÍA ШПИОН Language of Espionage, printed on SCHPION MAJASUSI windows around entrance doors P1.1.0.0 Visitor Mission Statement For Your Eyes Only For Your Eyes Only Entry beyond this point is on a need-to-know basis. Who needs to know? All who would understand the world. All who would glimpse the unseen hands that touch our lives. You will learn the secrets of tradecraft – the tools and techniques that influence battles and sway governments. You will uncover extraordinary stories hidden behind the headlines. You will meet men and women living by their wits, lurking in the shadows of world affairs. More important, however, are the people you will not meet. The most successful spies are the unknown spies who remain undetected. Our task is to judge their craft, not their politics – their skill, not their loyalty. Our mission is to understand these daring professionals and their fallen comrades, to recognize their ingenuity and imagination. Our goal is to see past their maze of mirrors and deception to understand their world of intrigue. Intelligence facts written on glass How old is spying? First record of spying: 1800 BC, clay tablet from Hammurabi regarding his spies. panel on left side of lobby First manual on spy tactics written: Over 2,000 years ago, Sun Tzu’s The Art of War. 6 video screens behind glass panel with facts and images.
    [Show full text]
  • Cyber Intelligence Tradecraft Report the State of Cyber Intelligence Practices in the United States Copyright 2019 Carnegie Mellon University
    Cyber Intelligence Tradecraft Report The State of Cyber Intelligence Practices in the United States Copyright 2019 Carnegie Mellon University. All Rights Reserved. This material is based upon work funded and supported by the Department of Defense under Contract No. FA8702-15-D-0002 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center. The view, opinions, and/or findings contained in this material are those of the author(s) and should not be construed as an official Government position, policy, or decision, unless designated by other documentation. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [DISTRIBUTION STATEMENT A] This material has been approved for public release and unlimited distribution. Please see Copyright notice for non-US Government use and distribution. Internal use:* Permission to reproduce this material and to prepare derivative works from this material for internal use is granted, provided the copyright and “No Warranty” statements are included with all reproductions and derivative works.
    [Show full text]
  • Tradecraff in ANCIENT GREECE
    DECLASSIFIED Authority NND 947003 Strategemata I I TRADECRAFf IN ANCIENT GREECE Rose Mary Sheldon 1 The ancient Greeks knew a great deal about the ins and outs of spying, but they did not make our modern terminology distinctions among intelligence collection, security, counterintelligence, and covert operations. If the Greeks did h~ve a word for it, it was strategemata, the single heading under which they gtouped all such activities. We are able to study these "strategems of war" today, t~anks to the survival of several Greek military handbooks, called strategika biblia. Their chapters on intelligence gathering instruct a commander in what w~uld today be called tradecraft: the finer arts of running agents, sending secret rriessages, using codes. ciphers, disguises, and surveillance. We can also glean information from the works of Greek historians and other ancient writers who, even if they are not primarily concerned with military matters, do refer occa­ sibnally to techniques of secret operations. Here is a look at what these sources h~ve to say about the " how to do it" of ancient spying. Of all the surviving military treatises, by far the best is the one written about ~7 B.C. by Aeneas the Tactician-another name, it is thought, for Aeneas of Stymphalos, general of the Arcadian Confederacy. As a fourth-century com­ mlmder, he very likely served most of his time as a mercenary soldier. The Arcadians had been the first Greeks to turn to soldiering as a profession and were mhre in demand than any other mercenaries. They were said to have been the first practical instructors in the art of war.
    [Show full text]
  • ATP 2-33.4 Intelligence Analysis
    ATP 2-33.4 Intelligence Analysis JANUARY 2020 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes ATP 2-33.4, dated 18 August 2014. Headquarters, Department of the Army This publication is available at Army Knowledge Online (https://armypubs.army.mil), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard). *ATP 2-33.4 Army Techniques Publication Headquarters No. 2-33.4 Department of the Army Washington, DC, 10 January 2020 Intelligence Analysis Contents Page PREFACE............................................................................................................. vii INTRODUCTION ................................................................................................... xi PART ONE FUNDAMENTALS Chapter 1 UNDERSTANDING INTELLIGENCE ANALYSIS ............................................. 1-1 Intelligence Analysis Overview ........................................................................... 1-1 Conducting Intelligence Analysis ........................................................................ 1-5 Intelligence Analysis and Collection Management ............................................. 1-8 The All-Source Intelligence Architecture and Analysis Across the Echelons ..... 1-9 Intelligence Analysis During Large-Scale Ground Combat Operations ........... 1-11 Intelligence Analysis During the Army’s Other Strategic Roles ........................ 1-13 Chapter 2 THE INTELLIGENCE ANALYSIS PROCESS ..................................................
    [Show full text]
  • Australian Institute of Professional Intelligence Officers the Peak Representative Body for All Intelligence Professionals
    Australian Institute of Professional Intelligence Officers The peak representative body for all intelligence professionals 24 June 2020 Senate Finance and Public Administration Legislation Committee Australian Institute of Professional Intelligence Officers Inc. Submission National Intelligence Enterprise: Oversight and Evaluation Arrangements Thank you for the opportunity to provide a submission to the Committee considering the Intelligence and Security Legislation Amendment (Implementing Independent Intelligence Review) Bill 2020. We have reviewed the Information about the bill, including the Explanatory Memorandum (EM) and provide the following submission. A few brief comments about the National Intelligence Enterprise The National Intelligence Enterprise (NIE) is critical to the ongoing protection of Australia and Australia’s interests, and arrangements put in place to coordinate and optimize Australia’s national intelligence effort should do just that. However, the 2017 Independent Review and references contained in the Intelligence and Security Legislation Amendment (Implementing Independent Intelligence Review) Bill 2020 EM refer only to agencies in the intelligence enterprise at the federal level, not those at the state and territory levels. Arguably, a national approach should incorporate the contributions of states and territories since we are referring to the protection of Australia and Australia’s interests. There is no longer any safe clear separation between federal and state/territory intelligence responsibilities in meeting
    [Show full text]