By Eric V. Larson, Derek Eaton, Brian Nichiporuk, Thomas S. Szayna
Offers an analytic framework and approach for the intelligence research of abnormal struggle (IW) environments that may function the foundation for IW intelligence curriculum improvement efforts. Defines IW when it comes to stylized occasions: population-centric (such as counterinsurgency) and counterterrorism. offers a close evaluate of IW-relevant protection coverage and method records and an inventory of appropriate doctrinal courses.
Read Online or Download Assessing Irregular Warfare: A Framework for Intelligence Analysis PDF
Best intelligence & espionage books
American army coverage is hotly debated.
Scott Ritter is the straight-talking former marine officer who the CIA desires to silence. After the 1991 Gulf struggle, Ritter helped lead the UN guns inspections of Iraq, and located himself on the middle of a perilous online game among the Iraqi and usa regimes. As Ritter unearths during this explosive publication, Washington used to be purely attracted to disarmament as a device for its personal schedule.
From the earliest making plans phases of the German counter-offensive within the Ardennes in the course of global struggle II (1939-1945), Hitler was once confident of the significance of taking the Meuse bridges. He resolved that, whilst his forces broke throughout the US traces, one distinct unit may be wearing American uniforms and issued with American guns and autos.
Extra resources for Assessing Irregular Warfare: A Framework for Intelligence Analysis
36 Assessing Irregular Warfare: A Framework for Intelligence Analysis centric IW environments discussed earlier. For example, terrorism— the terrorizing of a civilian population—is an extreme form of coercing and inﬂuencing a government or population, the success of which is susceptible to analysis using the framework for population-centric IW situations. Put another way, like insurgents, terrorists compete for the support or compliance of the larger population: Extremists use terrorism—the purposeful targeting of ordinary people—to produce fear to coerce or intimidate governments or societies in the pursuit of political, religious, or ideological goals.
Comparison to the Standard IPB Process Doctrinally, the purpose of the IPB process is to systematically and continuously analyze the threat and environment in a speciﬁc geographic area in order to support military decisionmaking, enabling the 34 See NMSP-WOT, 2/06, pp. 28–33. A Framework for Assessing Irregular Warfare 41 commander to selectively apply his combat power at critical points in time and space.
Terrorist networks also share many of the conceptual features of other adversary networks, including insurgent networks, that are already the subject of detailed intelligence analysis for targeting and other purposes: All enemy networks rely on certain key functions, processes, and resources to be able to operate and survive. These three elements are an important basis for counter-network strategies and can be deﬁned as follows: — Function (Critical Capability): A speciﬁc occupation, role, or purpose.
Assessing Irregular Warfare: A Framework for Intelligence Analysis by Eric V. Larson, Derek Eaton, Brian Nichiporuk, Thomas S. Szayna