CSM Forum

Haubrich, Lawrence J.
April 2005
Military Intelligence Professional Bulletin;Apr-Jun2005, Vol. 31 Issue 2, p3
The article talks about the need for Military Intelligence professionals to understand the current threat and its associated terminology. Transnational means without geographical boundaries -- there are no real state borders or political restraints, the world is the terrorist's playground. In the past, terrorist organizations often relied on state sponsors for funding, equipment and logistical support.


Related Articles

  • U.S. ties Syrian intelligence to Al Qaida network in Iraq.  // Geo-Strategy Direct;10/10/2007, p11 

    The article reports on the claims of the U.S. military that Syrian intelligence has relayed funding and support to Al Qaida cells in Iraq. Evidence has come from captured Al Qaida operatives who entered Iraq from Syria. On September 3, 2007, Iraqi and U.S. forces dismantled an Al Qaida cell in...

  • Egypt identifies Sinai bombers.  // Geo-Strategy Direct;5/10/2006, p5 

    The article reports that Egyptian intelligence has determined the identities of several of the bombers as well as the planner of strikes in Dahab and Rafah. On April 30, 2006, the Egyptian official Middle East News Agency reported that the intelligence community has determined the identity of...

  • Hunter, Sensenbrenner Hold Line.  // Human Events;12/6/2004, Vol. 60 Issue 41, p1 

    Deals with the conflict over an intelligence reform bill that the U.S. Congress is considering in response to a report by the National Commission on Terrorist Attacks Upon the U.S. as of December 2004. Mission of the U.S. military unit head in Iraq's Sunni Triangle; Issues regarding the control...

  • Gold Block, ICE Man, and Mom Welcome to Guantanamo Bay. Babbin, Jed // American Spectator;Sep2005, Vol. 38 Issue 7, p16 

    Focuses on civilian and military interrogators, intelligence analysts and linguists at the U.S. prison facility in Guantanamo Bay, Cuba. Role of prisoners as source of information about terrorists; Responsibilities of an intelligence analyst; Examples of intelligence information provided by the...

  • Al Qaida movements near Israel noted.  // Geo-Strategy Direct;4/19/2006, p10 

    The article reports on the concern of Israeli and Palestinian officials that Al Qaida terrorists are stepping up their involvement in Israeli and Palestinian authorities. Two Palestinians were caught planning attacks on behalf of Al Qaida in Jerusalem. Military intelligence reported that Al...

  • Al Qaida-North Korea terror link downplayed by U.S. intelligence; Commission: U.S. cyber security poor, needs private sector input; 'Sham Shad' op 'succeeded in separating (Taliban) from populace' – August 18, 2010.  // Geo-Strategy Direct;8/18/2010, p8 

    The article reports that links between North Korea and Al Qaida, disclosed in a leaked U.S. military intelligence, are being denied by the U.S. intelligence officials. According the report, a deal with the North Korean government was made by terrorist Osama Bin Laden for remote-controlled...

  • What Intelligence Agencies Do. Rabiger, Joanna // Government Intelligence Agencies;2003, p9 

    Discusses the key duties and responsibilities of the intelligence agencies of countries. Safeguarding of national security; Prevention of the spread of illegal arms and nuclear weaponry; Combating global drug trafficking. INSET: RESPONSIBILITIES.

  • Untitled. Thomas, Charles W. // Military Intelligence Professional Bulletin;Apr-Jun95, Vol. 21 Issue 2, p2 

    Explains that army intelligence is a vital element of the total intelligence system. Focus of army intelligence; Importance of utilizing emerging technologies to advance army intelligence; Discussion on the elements that make total intelligence system.

  • Intelligence for the Coalition: The Story of Support to Coalition Task Force-Kuwait. Moore, William R.; Boll, Jr., Kenneth H. // Military Intelligence Professional Bulletin;Jan-Mar99, Vol. 25 Issue 1, p4 

    Discusses the organization of the Coalition Task Force-Kuwait (CTF-K) intelligence operations support units as part of the Operation Desert Thunder in February 1998. Functions of CTF-K C/J2 section; Role of the Task Force Counterintelligence Coordinating Authority; Functions of the Joint...


Read the Article


Sign out of this library

Other Topics