Intelligence Threat Handbook
DIANE Publishing, 1996 - 69 pages
Provides an unclassified reference handbook which explains the categories of intelligence threat, provides an overview of worldwide threats in each category, and identifies available resources for obtaining threat information. Contents: intelligence collection activities and disciplines (computer intrusion, etc.); adversary foreign intelligence operations (Russian, Chinese, Cuban, North Korean and Romanian); terrorist intelligence operations; economic collections directed against the U.S. (industrial espionage); open source collection; the changing threat and OPSEC programs.
analysis bombing Bureau of Investigation China clandestine collection capabilities COMINT commercial Committee computer intruders conduct Counterintelligence countermeasures critical information databases Defense Department diplomatic Economic Espionage economic intelligence electronic ELINT facilities FAPSI Federal Bureau FISINT foreign intelligence services gence hackers HAMAS Hizballah HUMINT IMINT industrial espionage Intelligence Agency intelligence collection activities intelligence collection threat intelligence cycle intelligence operations intelligence organizations Interagency OPSEC Support IOSS Iran Islamic Jeffrey Judiciary Libya ligence MASINT military monitor National Security obtain Oleg Gordievsky open source collection open source information OPSEC process OPSEC program manager OPSEC Support Staff personnel proprietary data proprietary information Qods Force radar responsible Richelson Russian intelligence satellites SIGINT Signals Intelligence South Korea Soviet Union sponsored Sudan targeting the United technical technologies telecommunications terrorism terrorist terrorist attacks terrorist groups terrorist operations terrorist organizations tion U.S. adversaries U.S. Corporations U.S. Government U.S. House Washington weapons
Page 41 - Investigation (FBI) defines terrorism as "the unlawful use of force or violence against persons or property to intimidate or coerce a government, the civilian population, or any segment thereof, in furtherance of political or social objectives" (Federal Bureau of Investigation 1996, 3).
Page 21 - Bruce D. Berkowitz and Allan E. Goodman, Strategic Intelligence for American National Security (Princeton, NJ: Princeton University Press, 1989), 4. Notably, the last authors do not acknowledge the existence of "operational intelligence," which suggests a recent origin of the term, in the sense used in the present paper.
Page 44 - To this end, the study is sponsored jointly by the Office of the Assistant Secretary of Defense for Special Operations and Low Intensity Conflict (OASD/SO/LIC) and the Office of the Under Secretary of State for Public Diplomacy and Public Affairs (DOS/R).
Page 42 - Studeman, stated, [Islamic] groups are even more dangerous in some ways than the traditional groups because they do not have a well-established organizational identity and they tend to decentralize and compartment their activities. They are also capable of producing more sophisticated conventional weapons as well as chemical and biological agents.
Page 39 - Christopher Andrew and Oleg Gordievsky, KGB: The Inside Story (New York: Harper Collins, 1990), pp. 239, 277-278, 305-306; Douglas L. Wheeler, "In the Service of Order: The Portuguese Political Police and the British, German, and Spanish Intelligence, 1932-1945," Journal of Contemporary History, XVIII (1983), pp.
Page 27 - Movement intentionally imparted to film at such a rate as to compensate for the forward motion of an air or space vehicle when photographing ground objects. imagery...
Page 50 - Has carried out terrorist attacks in 20 countries, killing or injuring almost 900 persons. Targets include the United States, the United Kingdom, France, Israel, moderate Palestinians, the PLO, and various Arab countries. Major attacks included the Rome and Vienna airports in December 1985...
Page 27 - ... derived from specific technical sensors for the purpose of identifying any distinctive features associated with the source, emitter, or sender and to facilitate subsequent identification and/or measurement of the same. Also called MASINT. 225 I I I S ¿4<,t7...
Page 50 - Location/Area of Operation Operates in the Bekaa Valley, the southern suburbs of Beirut, and southern Lebanon; has established cells in Europe, Africa, South America, North America, and elsewhere. External Aid Receives substantial amounts of financial, training, weapons, explosives, political, diplomatic, and organizational aid from Iran.