10.07.2015 Views

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

Historical Dictionary of Terrorism Third Edition

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INTELLIGENCE • 273interests. Such covert activities can range from the benign, such asproviding moral support and covert financial aid to friendly groupsor national governments, to the sinister, such as engaging in sabotageor even targeted assassinations <strong>of</strong> key figures. Having good intelligenceabout terrorist organizations or state sponsors <strong>of</strong> terrorism isessential for effective counterterrorism. From the viewpoint <strong>of</strong> theterrorist group or state sponsor, having solid intelligence about theroutines and countermeasures <strong>of</strong> one’s targets and their vulnerabilitiesis essential for carrying out effective terrorist attacks.There are three main sources <strong>of</strong> intelligence. First, materialsconsisting <strong>of</strong> publicly available documents and mass media arereferred to as open source intelligence (OSINT). Surprisingly,95 to 99 percent <strong>of</strong> the content used in producing good classifiedintelligence analysis may come from open sources. Second, technicalintelligence usually consists <strong>of</strong> electronic interception anddecoding <strong>of</strong> encrypted radio or Internet communications, knownas signals intelligence (SIGINT), although there are also otherclassifications <strong>of</strong> technical intelligence depending on the type <strong>of</strong>signals being observed and the technical means used to measurethem. Thus, observations using satellites, unmanned aerial vehicles(UAVs), or sensors capable <strong>of</strong> detecting telltale isotopes representother forms <strong>of</strong> technical intelligence in addition to SIGINT. <strong>Third</strong>,there is human intelligence (HUMINT) involving the recruiting <strong>of</strong>foreign nationals or informers from inside terrorist groups to betraytheir nation or groups by relaying secret information to those whorecruited them. This is <strong>of</strong>ten the most valuable information becauseit can reveal those motives and details <strong>of</strong> planning that cannot beinferred from open sources or technical intelligence alone. GoodHUMINT would try to get multiple independent sources to preventthe likelihood <strong>of</strong> deception or disinformation.Preventing terrorist attacks usually requires having good HU-MINT in addition to the other sources <strong>of</strong> information, but this is <strong>of</strong>tenthe most difficult information to obtain given the extremely closedand clandestine nature <strong>of</strong> most terrorist groups, as well as their use<strong>of</strong> compartmentalization and cellular organization to prevent theirmembers from having too much insider information that they mightbetray under interrogation or torture. Ironically, most terrorists benefitgreatly by relying on OSINT as it is provided by the mass media,public databases, maps, technical and architectural schematics, and

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!