SlideShare a Scribd company logo
Strategic War-Time Examples
The intelligence collection techniques that I think have been
used to the greatest effect in Iraq and Afghanistan is HUMINT
and SIGINT. This could be that I am a little bias of the two
because I have worked for a SIGNIT and HUMINT agency.
HUMINT intelligence has been great in the war on terrorism in
Afghanistan. Afghanistan is a more tribal area than Iraq and
while SIGNIT is still possible through the use of cell phone and
internet tracking, I have noticed that best results comes from the
information gathered by case officers conducting clandestine
operations on the ground. SIGNIT is used to track terrorist
networks, but more so the traces are coming from Pakistan and
the attacks are taking place in Afghanistan. SIGNIT would have
more success if not only drone strikes were conducted in
Pakistan, but also raids by US forces as well.
HUMINT and SIGNIT have had great success in Iraq as well.
Being that Iraq is a little more modernized that Afghanistan,
there are far more people with cell phones and internet
capability, this includes the terrorist organizations, which
makes tracking and finding them that much easier. Specialty
units in the US military and intelligence communities were able
to track cells phones of leaders and target them with a raid or a
drone attack. However, some terrorist became wise to the raid
tactics of the units coming to capture or kill them. There is a
device that the terrorist could purchase on the street corner or at
a cell phone accessory shop, and this device was a little light
that would light up when the cell phone rings. The bad part
apart that device, is that it would light up when the cell phone
lost a signal as well. So if a terrorist group is in a home and
their cell phones all lost a signal at the same time, they knew
that their phones have been jammed by a jamming device and a
raid was about to be conducted on their home.
Strategic War-Time Examples2
I have spent time in both Iraq and Afghanistan; in my
experience HUMINT and SIGINT have been the most effective
against the threats we face there. It is amazing to me that both
of these countries have progressed little in 2000 years, however
every time I am out in a city almost every person I see has a cell
phone! Of course this includes the bad guys as well, they have
enhanced their tradecraft when using phones or radios but a lot
of them have not. This of course affords us ample opportunities
to utilize SIGINT when tracking and targeting insurgents to
devastating effect. However HUMINT is quite effective as well
in these countries, particularly due to the high level of cultural
backstabbing that occurs.
Speaking from my experience working with just one of the
agencies in the IC, it appears that the most successful use of
these two tools, in either country, is by combining the two in
support of each other. I have seen the convergence of these two
disciplines many times in the field and together they are
extremely versatile through human intelligence efforts, the
United States might be able to recruit a tribal leader previously
loyal to the Taliban in Afghanistan. By comparing his
conversations with the Taliban through the use of Signals
Intelligence, a higher level of confidence might be achieved
concerning his true loyalty
1
. This technique is often employed and quite successfully.
HUMINT is a very useful tool for us although it can be difficult
to employ and is susceptible to the whims of the asset. In both
countries we know we are dealing with questionable characters
with questionable motivations. If we have a measure of control
on the asset we can then use SIGINT to further vet or exploit an
asset. We could take advantage of technology to examine the
assets electronic devices to determine associates or to track the
asset to determine his truthfulness. Exploiting cell phones is a
bit more successful in Iraq due to the country being a little
ahead of Afghanistan technologically. This also affords us an
edge in Iraq using SIGINT to correlate relationships amongst
insurgent groups. I have seen targeters ply their trade in the
field and it is very impressive. By tracking one cell phone
number or phone they are able to connect relationships with
other insurgents called from that phone, then traced from phone
to phone down the line. Target locations can be roughly located,
then possibly confirmed or narrowed down by a HUMINT
source. There are a great deal more technical descriptions
involved in this process; I am always truly impressed by the
possibilities using SIGINT.
HUMINT is so crucial in Afghanistan because the dirt bags
spend a great deal of time in very remote and technologically
poor areas. Specifically near the Pakistan border we frequently
use the same process in reverse when SIGINT falls short.
HUMINT source intelligence has been around since the first
person thought to gather intelligence; it has the ability to reach
almost anywhere and is not solely dependent on technology.

More Related Content

Similar to Strategic War-Time ExamplesThe intelligence collection techniq.docx

Deep web
Deep webDeep web
Deep web
JANNAULIT
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
Hector Dominguez
 
WRT 205 U3
WRT 205 U3WRT 205 U3
WRT 205 U3
Vincent Perez
 
It technology used by terrorist
It technology used by terroristIt technology used by terrorist
It technology used by terrorist
Pravin Devkar
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
Natasha Barnett
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
Blake Feldman
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
gururaj lulkarni
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
Kirubaburi R
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
Mariah Antoinne
 
The Smart Border Technology of 21st Century - Bahaa Abdul Hadi.pdf
The Smart Border Technology of 21st Century - Bahaa Abdul Hadi.pdfThe Smart Border Technology of 21st Century - Bahaa Abdul Hadi.pdf
The Smart Border Technology of 21st Century - Bahaa Abdul Hadi.pdf
Bahaa Abdulhadi
 
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
sktambifortune
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
MrityunjaySaraswat
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
Jonathan Alley
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
REVULN
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
hyacinthshackley2629
 
Reply to post 1 & 2 with 250 words eachPost 11.  What is t
Reply to post 1 & 2 with 250 words eachPost 11.  What is tReply to post 1 & 2 with 250 words eachPost 11.  What is t
Reply to post 1 & 2 with 250 words eachPost 11.  What is t
felipaser7p
 
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptxALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
Trojan Hunt India
 

Similar to Strategic War-Time ExamplesThe intelligence collection techniq.docx (17)

Deep web
Deep webDeep web
Deep web
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
WRT 205 U3
WRT 205 U3WRT 205 U3
WRT 205 U3
 
It technology used by terrorist
It technology used by terroristIt technology used by terrorist
It technology used by terrorist
 
Digital Surveillance
Digital SurveillanceDigital Surveillance
Digital Surveillance
 
Surveillance Technology
Surveillance TechnologySurveillance Technology
Surveillance Technology
 
Survillance description
Survillance descriptionSurvillance description
Survillance description
 
Honeypots for Network Security
Honeypots for Network SecurityHoneypots for Network Security
Honeypots for Network Security
 
Pros and cons of today
Pros and cons of todayPros and cons of today
Pros and cons of today
 
The Smart Border Technology of 21st Century - Bahaa Abdul Hadi.pdf
The Smart Border Technology of 21st Century - Bahaa Abdul Hadi.pdfThe Smart Border Technology of 21st Century - Bahaa Abdul Hadi.pdf
The Smart Border Technology of 21st Century - Bahaa Abdul Hadi.pdf
 
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
4. Search the Web for uses of Big Data in homeland security. Specifi.pdf
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx10 Criminology in the FutureCriminology in the FutureKristop.docx
10 Criminology in the FutureCriminology in the FutureKristop.docx
 
Reply to post 1 & 2 with 250 words eachPost 11.  What is t
Reply to post 1 & 2 with 250 words eachPost 11.  What is tReply to post 1 & 2 with 250 words eachPost 11.  What is t
Reply to post 1 & 2 with 250 words eachPost 11.  What is t
 
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptxALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
ALL ABOUT TROJAN HUNT INDIA WHO HELPS IN CYBERCRIME INVESTIGATIONS.pptx
 

More from cpatriciarpatricia

Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docxStrict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
cpatriciarpatricia
 
Stress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docxStress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docx
cpatriciarpatricia
 
Stress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docxStress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docx
cpatriciarpatricia
 
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docxStrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
cpatriciarpatricia
 
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docxStrengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
cpatriciarpatricia
 
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docxStrengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
cpatriciarpatricia
 
Street Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docxStreet Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docx
cpatriciarpatricia
 
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docxStrengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
cpatriciarpatricia
 
Stratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docxStratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docx
cpatriciarpatricia
 
Street CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docxStreet CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docx
cpatriciarpatricia
 
Strengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docxStrengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docx
cpatriciarpatricia
 
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docxStrengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
cpatriciarpatricia
 
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docxStreet artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
cpatriciarpatricia
 
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docxStream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
cpatriciarpatricia
 
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docxSTRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
cpatriciarpatricia
 
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docxSTRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
cpatriciarpatricia
 
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docxStrategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
cpatriciarpatricia
 
Strategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docxStrategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docx
cpatriciarpatricia
 
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docxStrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
cpatriciarpatricia
 
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docxStrategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
cpatriciarpatricia
 

More from cpatriciarpatricia (20)

Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docxStrict APA format 1 page and no references before 2015. Peer-reviewe.docx
Strict APA format 1 page and no references before 2015. Peer-reviewe.docx
 
Stress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docxStress and Healthcare Workers Productivity at Lexington Medical .docx
Stress and Healthcare Workers Productivity at Lexington Medical .docx
 
Stress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docxStress and Chronic Illness- Choose and describe chronic illness su.docx
Stress and Chronic Illness- Choose and describe chronic illness su.docx
 
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docxStrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
StrengthsWeaknessesOpportunitiesThreatsSkillsK.docx
 
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docxStrengths-based nursing (SBN) is an approach to care in which eigh.docx
Strengths-based nursing (SBN) is an approach to care in which eigh.docx
 
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docxStrengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
Strengths-to-Strategies, Curriculum Vitae, and Action PlanDue.docx
 
Street Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docxStreet Sense Media uses a range of creative platforms to spotl.docx
Street Sense Media uses a range of creative platforms to spotl.docx
 
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docxStrengths Paper Write a 2-page paper that identifies your top 5 str.docx
Strengths Paper Write a 2-page paper that identifies your top 5 str.docx
 
Stratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docxStratification and Prejudice in Current EventsThe purpose of t.docx
Stratification and Prejudice in Current EventsThe purpose of t.docx
 
Street CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docxStreet CodeConsider this quote from Robert Sampson and William J.docx
Street CodeConsider this quote from Robert Sampson and William J.docx
 
Strengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docxStrengths and Barriers to Program Implementation As you de.docx
Strengths and Barriers to Program Implementation As you de.docx
 
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docxStrengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
Strengths 1. Large Enrollment 2. Flexible class schedules1. The.docx
 
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docxStreet artist Shepard Fairey, who was graduated from the Rhode I.docx
Street artist Shepard Fairey, who was graduated from the Rhode I.docx
 
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docxStream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
Stream MorphologyInvestigation ManualENVIRONMENTAL SCI.docx
 
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docxSTRATEGYLeadershipLighting a fire under theniWhy urgen.docx
STRATEGYLeadershipLighting a fire under theniWhy urgen.docx
 
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docxSTRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
STRATEGIESWhat can I do with this majorAREAS EMPLOYER.docx
 
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docxStrategies for ChangeWeek 7 The Hard Side of Change Management.docx
Strategies for ChangeWeek 7 The Hard Side of Change Management.docx
 
Strategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docxStrategic PlanningUnrestrictedthe managerial proc.docx
Strategic PlanningUnrestrictedthe managerial proc.docx
 
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docxStrategicCompetitive PositionApple Inc. is known for its state-of.docx
StrategicCompetitive PositionApple Inc. is known for its state-of.docx
 
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docxStrategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
Strategies for Negotiation & Conflict Resolution Dr. Janice Ba.docx
 

Recently uploaded

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 

Recently uploaded (20)

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 

Strategic War-Time ExamplesThe intelligence collection techniq.docx

  • 1. Strategic War-Time Examples The intelligence collection techniques that I think have been used to the greatest effect in Iraq and Afghanistan is HUMINT and SIGINT. This could be that I am a little bias of the two because I have worked for a SIGNIT and HUMINT agency. HUMINT intelligence has been great in the war on terrorism in Afghanistan. Afghanistan is a more tribal area than Iraq and while SIGNIT is still possible through the use of cell phone and internet tracking, I have noticed that best results comes from the information gathered by case officers conducting clandestine operations on the ground. SIGNIT is used to track terrorist networks, but more so the traces are coming from Pakistan and the attacks are taking place in Afghanistan. SIGNIT would have more success if not only drone strikes were conducted in Pakistan, but also raids by US forces as well. HUMINT and SIGNIT have had great success in Iraq as well. Being that Iraq is a little more modernized that Afghanistan, there are far more people with cell phones and internet capability, this includes the terrorist organizations, which makes tracking and finding them that much easier. Specialty units in the US military and intelligence communities were able to track cells phones of leaders and target them with a raid or a drone attack. However, some terrorist became wise to the raid tactics of the units coming to capture or kill them. There is a device that the terrorist could purchase on the street corner or at a cell phone accessory shop, and this device was a little light that would light up when the cell phone rings. The bad part apart that device, is that it would light up when the cell phone lost a signal as well. So if a terrorist group is in a home and their cell phones all lost a signal at the same time, they knew that their phones have been jammed by a jamming device and a raid was about to be conducted on their home.
  • 2. Strategic War-Time Examples2 I have spent time in both Iraq and Afghanistan; in my experience HUMINT and SIGINT have been the most effective against the threats we face there. It is amazing to me that both of these countries have progressed little in 2000 years, however every time I am out in a city almost every person I see has a cell phone! Of course this includes the bad guys as well, they have enhanced their tradecraft when using phones or radios but a lot of them have not. This of course affords us ample opportunities to utilize SIGINT when tracking and targeting insurgents to devastating effect. However HUMINT is quite effective as well in these countries, particularly due to the high level of cultural backstabbing that occurs. Speaking from my experience working with just one of the agencies in the IC, it appears that the most successful use of these two tools, in either country, is by combining the two in support of each other. I have seen the convergence of these two disciplines many times in the field and together they are extremely versatile through human intelligence efforts, the United States might be able to recruit a tribal leader previously loyal to the Taliban in Afghanistan. By comparing his conversations with the Taliban through the use of Signals Intelligence, a higher level of confidence might be achieved concerning his true loyalty 1 . This technique is often employed and quite successfully. HUMINT is a very useful tool for us although it can be difficult to employ and is susceptible to the whims of the asset. In both countries we know we are dealing with questionable characters with questionable motivations. If we have a measure of control on the asset we can then use SIGINT to further vet or exploit an asset. We could take advantage of technology to examine the assets electronic devices to determine associates or to track the asset to determine his truthfulness. Exploiting cell phones is a bit more successful in Iraq due to the country being a little ahead of Afghanistan technologically. This also affords us an
  • 3. edge in Iraq using SIGINT to correlate relationships amongst insurgent groups. I have seen targeters ply their trade in the field and it is very impressive. By tracking one cell phone number or phone they are able to connect relationships with other insurgents called from that phone, then traced from phone to phone down the line. Target locations can be roughly located, then possibly confirmed or narrowed down by a HUMINT source. There are a great deal more technical descriptions involved in this process; I am always truly impressed by the possibilities using SIGINT. HUMINT is so crucial in Afghanistan because the dirt bags spend a great deal of time in very remote and technologically poor areas. Specifically near the Pakistan border we frequently use the same process in reverse when SIGINT falls short. HUMINT source intelligence has been around since the first person thought to gather intelligence; it has the ability to reach almost anywhere and is not solely dependent on technology.