Transnational Threats 101: Today's Asymmetric Battlefield

Chenery, John T.
July 1999
Military Intelligence Professional Bulletin;Jul-Sep99, Vol. 25 Issue 3, p4
Discusses the concept on transnational threats from the perspective of intelligence professionals in the United States. Definition of transnational threats; Illegal activities that are considered transnational threats; Discussions on the different illegal activities; Why people should be concerned on transnational threat; Measures taken to address the threats.


Related Articles

  • CHAPTER 6: TRANSNATIONAL THREATS VIS-À-VIS LAW ENFORCEMENT AND MILITARY INTELLIGENCE: LESSONS ON THE EMERGING RELATIONSHIP. Rindskopf-Parker, Elizabeth // Transnational Threats: Blending Law Enforcement & Military Strat;11/1/2000, p65 

    Chapter 6 of the book "Transnational Threats: Blending Law Enforcement & Military Strategies" is presented. It focuses on the suggestions given by the author for better coordination between law enforcement and military intelligence in the United States. According to the author, for better...

  • The Pentomic Division. Wyman, Willard G. // Vital Speeches of the Day;5/1/58, Vol. 24 Issue 14, p431 

    Presents the text of a speech delivered by General Willard G. Wyman of the U.S. Continental Army Command, on April 3, 1958, which deals with military intelligence.

  • CI Technical Capabilities for Homeland Security. Duncklee, Elizabeth M.; McKnight, Jeremy J. // Military Intelligence Professional Bulletin;Jul-Sep2002, Vol. 28 Issue 3, p21 

    Talks about the technical capabilities of counterintelligence (CI) for Homeland Security (HLS) in the U.S. Contribution of technical CI capabilities in the Global War on Terrorism; Role of the 310th Military Intelligence Battalion in providing capabilities to aid HLS and supply technical...

  • Army Intelligence Support to Homeland Security. Andrew, Brad T. // Military Intelligence Professional Bulletin;Jul-Sep2002, Vol. 28 Issue 3, p48 

    Focuses on the support of the U.S. Army Intelligence to Homeland Security and Homeland Defense. Contribution of Army Intelligence to the mission of Homeland Security (HLS) and Homeland Defense (HLD); Overview of the Army transformation; Requirements to achieve knowledge superiority and decision...

  • CHINA How big a threat? Newman, Richard J.; Whitelaw, Kevin // U.S. News & World Report;7/23/2001, Vol. 131 Issue 3, p30 

    Discusses the assessment of China's military by the United States. Decision of the National Intelligence Council to fire Rand, an organization entrusted with some of the U.S. government's most sensitive and secretive national security studies, from a classified project ordered by Congress to...

  • Intelligence Innovation Lags. Harris, Shane // National Journal;8/4/2007, Vol. 39 Issue 31, p38 

    The article reports on the impact of the declining influence of the U.S. over scientific and technological innovation on U.S. intelligence agencies, according to the Intelligence Science Board. In a report issued in November 2006, parts of which were recently obtained by "National Journal," the...

  • Adrift in Space. Butler, Amy // Aviation Week & Space Technology;10/13/2008, Vol. 169 Issue 14, p34 

    This article discusses the plan of the U.S. Department of Defense to make no changes to its national security space management structure until the new administration is settled in 2009. It relates the plan to a series of changes for the department, White House and intelligence community...

  • Priority No. 1: Homeland Security. Rodriguez, Paul M. // Insight on the News;11/12/2001, Vol. 17 Issue 42, p48 

    Argues that the priority of the United States federal government should the homeland security in the wake of the September 11, 2001 terrorist attacks. Discussion on the problem of the national intelligence operatives for failure to prevent the terrorist attack; Controversy about a computer...

  • CDI Study Examines Strategic Approaches to Homeland Security. Hoffman, F.G. // Defense Monitor;Jun2002, Vol. 31 Issue 6, p6 

    Presents excerpts from a report published by the Center for Defense Information regarding ways to address threats to homeland security. Missile attack; Covert delivery of weapons of mass destruction or other methods of causing mass casualties; Crippling cyber-attack; Deterrence and...


Read the Article


Sign out of this library

Other Topics