Intelligence Threat Handbook

Front Cover
DIANE Publishing, 1996 - 69 pages
Provides an unclassified reference handbook which explains the categories of intelligence threat, provides an overview of worldwide threats in each category, and identifies available resources for obtaining threat information. Contents: intelligence collection activities and disciplines (computer intrusion, etc.); adversary foreign intelligence operations (Russian, Chinese, Cuban, North Korean and Romanian); terrorist intelligence operations; economic collections directed against the U.S. (industrial espionage); open source collection; the changing threat and OPSEC programs.

From inside the book

Selected pages

Contents

Common terms and phrases

Popular passages

Page 41 - Investigation (FBI) defines terrorism as "the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives" (Federal Bureau of Investigation 1996, 3).
Page 21 - Bruce D. Berkowitz and Allan E. Goodman, Strategic Intelligence for American National Security (Princeton, NJ: Princeton University Press, 1989), 4. Notably, the last authors do not acknowledge the existence of "operational intelligence," which suggests a recent origin of the term, in the sense used in the present paper.
Page 44 - To this end, the study is sponsored jointly by the Office of the Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (OASD/SO/LIC) and the Office of the Under Secretary of State for Public Diplomacy and Public Affairs (DOS/R).
Page 42 - Studeman, stated, [Islamic] groups are even more dangerous in some ways than the traditional groups because they do not have a well-established organizational identity and they tend to decentralize and compartment their activities. They are also capable of producing more sophisticated conventional weapons as well as chemical and biological agents.
Page 39 - Christopher Andrew and Oleg Gordievsky, KGB: The Inside Story (New York: Harper Collins, 1990), pp. 239, 277-278, 305-306; Douglas L. Wheeler, "In the Service of Order: The Portuguese Political Police and the British, German, and Spanish Intelligence, 1932-1945," Journal of Contemporary History, XVIII (1983), pp.
Page 27 - Movement intentionally imparted to film at such a rate as to compensate for the forward motion of an air or space vehicle when photographing ground objects. imagery...
Page 50 - Has carried out terrorist attacks in 20 countries, killing or injuring almost 900 persons. Targets include the United States, the United Kingdom, France, Israel, moderate Palestinians, the PLO, and various Arab countries. Major attacks included the Rome and Vienna airports in December 1985...
Page 27 - ... derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same. Also called MASINT. 225 I I I S ¿4<,t7...
Page 50 - Location/Area of Operation Operates in the Bekaa Valley, the southern suburbs of Beirut, and southern Lebanon; has established cells in Europe, Africa, South America, North America, and elsewhere. External Aid Receives substantial amounts of financial, training, weapons, explosives, political, diplomatic, and organizational aid from Iran.
Page 28 - It is designed to enhance mutual understanding and confidence by giving all participants, regardless of size, a direct role in observing military or other activities of concern to them.

Bibliographic information