National Defense Intelligence College Paper: Beneath the Surface - Intelligence Preparation of the Battlespace for Counterterrorism - bin Laden, al-Qaida, Jihad, Horn of Africa, Hezbollah

Nonfiction, History, Military, Strategy, Social & Cultural Studies, Political Science
Cover of the book National Defense Intelligence College Paper: Beneath the Surface - Intelligence Preparation of the Battlespace for Counterterrorism - bin Laden, al-Qaida, Jihad, Horn of Africa, Hezbollah by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781311314468
Publisher: Progressive Management Publication: December 6, 2013
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781311314468
Publisher: Progressive Management
Publication: December 6, 2013
Imprint: Smashwords Edition
Language: English

This unique and informative paper was produced by the National Intelligence University / National Defense Intelligence College. Topics and subjects include: terrorism, Usama bin Laden, al-Qaida, COA, COG, jihad, Horn of Africa, FARC, GSPC, hezbollah, HUJI, IIPB, IRA, JI, mission analysis, HUMINT, SIGINT, IMINT, COMINT, terrorist group types, OCOKA, Afghanistan, Iraq, terrain zones, JIPB, JFIC, JMIC, JWAC, LTTE, NASIC, open systems model, violent systems model, universal model, system properties, functional analysis systems technique (FAST), red teaming.

Major Thomas' Beneath the Surface comes at precisely the right time in the War on Terrorism. Over the past three years the U.S. military and other instruments of national power have been able to attack and damage Usama Bin Laden's al-Qaida network. The remainder of the War or Terrorism—which will continue for years— requires that intelligence be on the front. The War has been, and will continue to be, an intelligence war. In such a war intelligence and operations are not separate staff components; they are instead a blend of activities that are mutually reinforcing. In this continuing war every soldier is a collector, and every collector is a soldier; operators glean intelligence directly from the field, and intelligence is always operational. Further, the war ahead will demand new strategies for long-term success. The counterpunching phase is over. The rapid-fire operations-intelligence, counterterrorism-targeting cycle happening right now in Iraq and Afghanistan—the "find, fix, finish, exploit, then find again" process—becomes less powerful as the campaign continues. This cycle has to be underpinned by a strategic intelligence framework that ensures we are attacking a part of the enemy that matters—not just taking the near-term opportunity that inflicts little lasting damage.

The U.S. requires new strategies to collect intelligence, to manufacture new intelligence (using operations in doing so), and most importantly to organize data in new, systemic and strategic ways to make the most of what we know about this shadowy, self-healing and determined asymmetric, worldwide adversary.
In my view Major Thomas' work is one of the first coherent blueprints for the way ahead. For persons seeking to understand the complexity of terrorist violence, Chapter One provides a broad and comprehensive overview for thinking about the problem. For the counterterrorism practitioner, Chapters Two through Five are extraordinarily well-reasoned views on organizing data to maximize knowledge and potential power. Major Thomas also offers sound advice on leveraging well-organized intelligence data to derive effective courses of action and to focus operational activity for maximum effect.

Chapter 1 * COUNTERING TERRORISTS * Approach * Violent Theater * Violent Intellectuals * Terror's Bad Name * Innocence Lost * Fixing on Groups * Hybrid Adversary * Counterterrorism * Mission Analysis I * The Big Picture * Campaigning * Face-to-Face * Asymmetric Contests * Preparing the Battlespace * Four Phases * Three Levels * Linking Concepts * Parting Shots * Chapter 2 * TERROR'S SPACE * Lost in Space * Mission Analysis II * Getting it Done * Setting Limits * Going Three-Dimensional * What we Know and Don't Know * Remodeling Space * Mapping Stakeholders * Dimensional Sectors. * Positioning Players * Nested Characteristics * Urban Battlespace * Parting Shots * Chapter 3 * BATTLESPACE EFFECTS * Special Effects * Effects * Courses of Action * Step-by-Step * Total Effects * Net Effects * Dimensional Effects * Cumulative Effects * Parting Shots * Chapter 4 * EVALUATING CAPABILITIES * Adversary Capabilities * Centers of Gravity * Old Models * The Real World * Can Do * Full Spectrum Capabilities * Agents of Influence * Supermodels

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This unique and informative paper was produced by the National Intelligence University / National Defense Intelligence College. Topics and subjects include: terrorism, Usama bin Laden, al-Qaida, COA, COG, jihad, Horn of Africa, FARC, GSPC, hezbollah, HUJI, IIPB, IRA, JI, mission analysis, HUMINT, SIGINT, IMINT, COMINT, terrorist group types, OCOKA, Afghanistan, Iraq, terrain zones, JIPB, JFIC, JMIC, JWAC, LTTE, NASIC, open systems model, violent systems model, universal model, system properties, functional analysis systems technique (FAST), red teaming.

Major Thomas' Beneath the Surface comes at precisely the right time in the War on Terrorism. Over the past three years the U.S. military and other instruments of national power have been able to attack and damage Usama Bin Laden's al-Qaida network. The remainder of the War or Terrorism—which will continue for years— requires that intelligence be on the front. The War has been, and will continue to be, an intelligence war. In such a war intelligence and operations are not separate staff components; they are instead a blend of activities that are mutually reinforcing. In this continuing war every soldier is a collector, and every collector is a soldier; operators glean intelligence directly from the field, and intelligence is always operational. Further, the war ahead will demand new strategies for long-term success. The counterpunching phase is over. The rapid-fire operations-intelligence, counterterrorism-targeting cycle happening right now in Iraq and Afghanistan—the "find, fix, finish, exploit, then find again" process—becomes less powerful as the campaign continues. This cycle has to be underpinned by a strategic intelligence framework that ensures we are attacking a part of the enemy that matters—not just taking the near-term opportunity that inflicts little lasting damage.

The U.S. requires new strategies to collect intelligence, to manufacture new intelligence (using operations in doing so), and most importantly to organize data in new, systemic and strategic ways to make the most of what we know about this shadowy, self-healing and determined asymmetric, worldwide adversary.
In my view Major Thomas' work is one of the first coherent blueprints for the way ahead. For persons seeking to understand the complexity of terrorist violence, Chapter One provides a broad and comprehensive overview for thinking about the problem. For the counterterrorism practitioner, Chapters Two through Five are extraordinarily well-reasoned views on organizing data to maximize knowledge and potential power. Major Thomas also offers sound advice on leveraging well-organized intelligence data to derive effective courses of action and to focus operational activity for maximum effect.

Chapter 1 * COUNTERING TERRORISTS * Approach * Violent Theater * Violent Intellectuals * Terror's Bad Name * Innocence Lost * Fixing on Groups * Hybrid Adversary * Counterterrorism * Mission Analysis I * The Big Picture * Campaigning * Face-to-Face * Asymmetric Contests * Preparing the Battlespace * Four Phases * Three Levels * Linking Concepts * Parting Shots * Chapter 2 * TERROR'S SPACE * Lost in Space * Mission Analysis II * Getting it Done * Setting Limits * Going Three-Dimensional * What we Know and Don't Know * Remodeling Space * Mapping Stakeholders * Dimensional Sectors. * Positioning Players * Nested Characteristics * Urban Battlespace * Parting Shots * Chapter 3 * BATTLESPACE EFFECTS * Special Effects * Effects * Courses of Action * Step-by-Step * Total Effects * Net Effects * Dimensional Effects * Cumulative Effects * Parting Shots * Chapter 4 * EVALUATING CAPABILITIES * Adversary Capabilities * Centers of Gravity * Old Models * The Real World * Can Do * Full Spectrum Capabilities * Agents of Influence * Supermodels

More books from Progressive Management

Cover of the book Confronting the Ghost of Stalin: Euro-Atlantic Efforts to Secure Georgia - NATO Enlargement, Russia and Putin, Caucasian Legacy, Transcaucasus, Abkhazia, South Ossetia, Pankisi Gorge, Tsitelubani by Progressive Management
Cover of the book Loss of Signal: Aeromedical Lessons Learned from the STS-107 Columbia Space Shuttle Mishap - Aerospace Medicine, Reentry and Spacecraft Breakup, Search and Recovery, Forensic Sciences by Progressive Management
Cover of the book Complete Guide to NASA's James Webb Space Telescope (JWST) Project - Spacecraft, Instruments and Mirror, Science, Infrared Astronomy, GAO and Independent Review Reports, Congressional Hearings by Progressive Management
Cover of the book 2012 Review of Military Unmanned Aerial Vehicle (UAV) and Unmanned Aerial Systems (UAS) Issues - Current and Future Plans for DOD Drones for Surveillance and Combat, Policy Options by Progressive Management
Cover of the book Preventing Catastrophe: U.S. Policy Options for Management of Nuclear Weapons in South Asia - India and Pakistan Proliferation Threat, Strategic Delivery Capability, Conflict in Kashmir, NPT by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The United States Army Functional Concept for Mission Command 2016-2028 - TRADOC 525-3-3 - Intertheater and Intratheater Maneuver (Professional Format Series) by Progressive Management
Cover of the book Deliberate Force: A Case Study in Effective Air Campaigning - Final Report of the Air University Balkans Air Campaign Study - Demise of Yugoslavia, Destruction of Bosnia, Tactics, Aircraft, Weapons by Progressive Management
Cover of the book Art of War Paper: Closing the Security Gap - Building Irregular Security Forces, Iraq, Dhofar Region of Oman, North-West Frontier, Host Nation Decisions by Progressive Management
Cover of the book Al-Anbar Awakening: Volume I - American Perspectives, U.S. Marines and Counterinsurgency in Iraq, 2004-2009, Blackwater, Fallujah, al-Qaeda, Counterinsurgency, Ramadi, Turning the Tide by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force E-9A Range Control Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book A Test of U.S. Civil-Military Relations: Structural Influences of Military Reform on the Conflict between Presidents and Senior Military Commanders during Times of War - Civil War, Korean War, Kosovo by Progressive Management
Cover of the book U.S. Army War College Guide to National Security Issues, Volume I: Theory of War and Strategy - von Clausewitz, Mao, Sun Tzu, Che Guevara, Machiavelli, Luttwak - 5th Edition by Progressive Management
Cover of the book The Air Force Integrates: 1945-1964 - World War II, Freeman Field Mutiny, MacDill Riot, Unbunching, Eisenhower, Little Rock, Kennedy Era and the Civil Rights Act, Travis Riot, Blacks in USAF by Progressive Management
Cover of the book Israel in Perspective: Orientation Guide and Hebrew Cultural Orientation: Geography, History, Economy, Security, Religion, Jerusalem, Tel Aviv, Zionism, Jews and Arabs, Intifada, Gaza, Palestinians by Progressive Management
Cover of the book The Paradox of Power: Sino-American Strategic Restraint in an Age of Vulnerability - China and the U.S., Chinese Nuclear Weapons, Space, Cyberspace, Strategic Power, Cyber Warfare by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy