10.07.2015 Views

Warning Analysis for the Information Age - Higgins Counterterrorism ...

Warning Analysis for the Information Age - Higgins Counterterrorism ...

Warning Analysis for the Information Age - Higgins Counterterrorism ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Open-source Intelligence on Terrorist CBRNE ProgramsSurprisingly OSINT can provide valuable background and context <strong>for</strong>understanding terrorist CBRNE programs. Valuable open sources on <strong>the</strong> Global Waron Terrorism (GWOT) include:News stories from reporters in-country. With <strong>the</strong> high interest level on <strong>the</strong>GWOT, many newspapers, wire services, and TV networks have sent reporters closeto <strong>the</strong> action who have found unique data. Example – A Wall Street Journal reporterrecovered a computer in Kabul safehouse likely used by Al Qaeda’s Dr. AymanZawahiri which contained documents on building a chemical and biological warfareprogram.Local press reports. With worldwide interest in <strong>the</strong> GWOT, press coverage inregions in which <strong>the</strong> U.S. has few collection resources can help fill in <strong>the</strong> blanks.Example – in trials in Malaysia and Indonesia, including <strong>the</strong> recent one <strong>for</strong> <strong>the</strong>suspect Bali bombers, <strong>the</strong> suspects have testified about links between JemaahIslamiah (JI) and Al Qaeda, named <strong>the</strong> leaders involved, and identified personnel whotrained in Al Qaeda camps in Afghanistan. Such news reports are posted on <strong>the</strong>Lexis/Nexis database and often can be found online on <strong>the</strong> newspapers’ websites.Official Government statements or leaked official reports. When persons aredetained <strong>for</strong> questioning in <strong>the</strong> GWOT, local officials usually will release in<strong>for</strong>mationon those detentions and sometimes o<strong>the</strong>r officials will talk off-<strong>the</strong>-record to localreporters. Again, <strong>the</strong>se will appear in local press. Example – Pakistani governmentofficials released statements on captured Al Qaeda members and on questioning ofsuspect Al Qaeda-linked nuclear scientists and physicians; Malaysian and Indonesianpolice released reports on suspect JI terrorists.train from his house to visit or work at a suspect facility or a propaganda newsphoto of dignitaries lined up in front of a suspect facility could allow an imageryanalyst to find that facility. Similarly, as mentioned above, identification thatGeneral “Joe” A heads <strong>the</strong> Missile Corps in City S and Mr. “Bob” B works <strong>for</strong> <strong>the</strong>Atomic Energy Commission in City A through HUMINT and/or OSINT could bevery valuable to a SIGINT analyst who intercepts conversations between “Joe”and “Bob” about “special shipments” where <strong>the</strong> phones at each end are in <strong>the</strong> correctcities <strong>for</strong> <strong>the</strong> two offices.Strategic <strong>Analysis</strong> of a WMD Program—How do we assemble all <strong>the</strong>data into a multi-dimensional model?The kinds and amount of data that can potentially be used in a multidimensionalanalysis of a WMD program is enormous. At first glance it appears thatenormous computing power plus new kinds of “data-mining” tools are necessarybecause of <strong>the</strong> NIMD challenge, “How do we extract Novel Intelligence from114

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!