2004
DOI: 10.21236/ada476418
|View full text |Cite
|
Sign up to set email alerts
|

Beneath the Surface: Intelligence Preparation of the Battlespace for Counterterrorism

Abstract: Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. This book presents the deep subject-matter understanding gained by a mid-career U.S. Air Force officer who as a Research Fellow engaged in a year-long quest for insight into asymmetric conflict analysis and synthesis. During the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…What is clear is that these humanitarian initiatives afford valuable intelligence gathering opportunities to US forces in areas that they deem vulnerable to extremism. These projects can be seen as part of a larger US attempt to map the terrain, establish local sources of human intelligence and prepare the battlespace in the Horn of Africa (Thomas 2004).…”
Section: 'Waging Peace' In the Ogadenmentioning
confidence: 99%
“…What is clear is that these humanitarian initiatives afford valuable intelligence gathering opportunities to US forces in areas that they deem vulnerable to extremism. These projects can be seen as part of a larger US attempt to map the terrain, establish local sources of human intelligence and prepare the battlespace in the Horn of Africa (Thomas 2004).…”
Section: 'Waging Peace' In the Ogadenmentioning
confidence: 99%
“…To develop effective plans and approaches, analysts and operators must understand the roles of religious leaders, local politicians, and non-governmental, international and multi-national organizations present in a region, together with understanding of foreign internal defense forces, civil affairs, and the public, in effect, all those that shape the environment in which terrorist networks are spawned and operate. 41 This is no small task and worthy of an entirely separate discussion. Suffice it to say for our purposes in this evaluation, analysts and operators will have to build even more diffuse communities of interest and sources of information than are normally considered for lethal operations against terrorists.…”
Section: A Key Lesson From [Highvalue Target Case Studies] Is That Tamentioning
confidence: 99%
“…Moreover, the obligation of intelligence organizations to deliver actionable intelligence to affect tactical CT targets in the near-term continue to be levied along with long-range, threat estimates intended for executive, policymaking levels. 2 Improvements in intelligence sharing and new information sources have been leveraged, but shortcomings in these areas continue to impede mission success.…”
Section: Introductionmentioning
confidence: 99%
“…To get a sense of whether the organization is a strength or weakness, what its vulnerabilities are, and how it might be affected directly or indirectly, we need to assess its design, the independence of its units, the location of leadership, and "how hierarchical dynamics may be mixed with the network dynamics." (Thomas 2004, p. 159)), but this extensive response seems the most ineffective, although it remains the one of the main ways of responding the informational overload. It also contains the risks of complexing hierarchical interaction: bigger volumes of information could be required to be reduced and simplified, which can make the analysis more shallow [17, p. 10].…”
mentioning
confidence: 99%