All entities in this thesaurus/open source resource guide have been designated as terrorist organizations by one or more of the following organizations: The US State Department, US Terrorist Exclusion …
Open Source Exploitation: A Guide For Intelligence Analysts
This manual describes the basic concepts and devices used to exploit open sources of information. It presents an introduction to the subject and covers the most common tools and techniques. This …
Continue Reading about Open Source Exploitation: A Guide For Intelligence Analysts
Protective Intelligence & Threat Assessment Investigations: A Guide for State and Local Law Enforcement Officials
Threat assessment is a developing field pioneered by the U.S. Department of the Treasury’s U.S. Secret Service, which is charged with protecting the President of the United States and other U.S. and …
DoD Antiterrorism Handbook
This Handbook is reissued under the authority of DoD Directive 2000.12, “DoD Antiterrorism (AT) Program,” August 18, 2003 (reference (a)). It provides procedures and recommendations for reducing the …
Third Annual Report to the President and the Congress of the Advisory Panel to Assess Domestic Response Capabilities for Terrorism Involving Weapons of Mass Destruction
The tragic attacks of September 11, 2001, the subsequent anthrax attacks, and persistent threats clearly demonstrate the importance of continuing to prepare our nation to counter more effectively the …
Protecting the Homeland: Report of the Defense Science Board Task Force on Defensive Informaion Operations
In its 1996 report, the Defense Science Board (DSB) recommended that the Pentagon invest an additional $3 billion to strengthen defenses of its information networks. This report was viewed by some as …
Report of the Defense Science Board Task Force on Preventing and Defending Against Clandestine Nuclear Attack
In this report, clandestine nuclear attack means a nuclear or radiological attack • By anyone for any purpose, • Against the United States and/or U.S. military operations, • Delivered by means …
The Wiki and the Blog: Toward a Complex Adaptive Intelligence Community
US policy-makers, war-fighters, and law-enforcers now operate in a real-time worldwide decision and implementation environment. The rapidly changing circumstances in which they operate take on lives …
Continue Reading about The Wiki and the Blog: Toward a Complex Adaptive Intelligence Community
DCSINT Handbook No. 1.02, Cyber Operations and Cyber Terrorism
This handbook is one in a series of supplements to TRADOC DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, which is a basic terrorism primer prepared under the …
Continue Reading about DCSINT Handbook No. 1.02, Cyber Operations and Cyber Terrorism
DCSINT Handbook No. 1.03, Suicide Bombing in the COE
This handbook is one in a series of supplements to TRADOC DCSINT Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century, which is a basic terrorism primer prepared under the …
Continue Reading about DCSINT Handbook No. 1.03, Suicide Bombing in the COE