2,593
Views
6
CrossRef citations to date
0
Altmetric
Article

Post-9/11 wartime intelligence analysis

Bibliography

  • The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States–Executive Summary. Available at http://govinfo.library.unt.edu/911/report/911Report_Exec.htm.
  • Atwood, C. “Activity-Based Intelligence: Revolutionizing Military Intelligence Analysis.” Joint Forces Quarterly 77 (2015): 24–29.
  • Berkowitz, B. “The Soviet Target—Highlights in the Intelligence Value of Gambit and Hexagon, 1963–1984.” National Reconnaissance–Journal of Discipline and Practice (2012). http://www.nro.gov/history/csnr/articles/docs/gh%20journal_web.pdf.
  • Biltgen, P., T. S. Bacastow, T. Kaye, and J. M. Young. “Activity-Based Intelligence: Understanding Patterns-of-Life.” In T h e S t a t e a n d F u t u r e o f G E O I N T, 24–27. Washington, DC: The United States Geospatial Intelligence Foundation, 2017.
  • Biltgen, P., and S. Ryan. Activity-Based Intelligence: Principles and Applications. Boston: ARTECH House, 2016.
  • Burnes, B. “Complexity Theories and Organizational Change.” International Journal of Management Reviews 7 (2005): 73–90. doi:10.1111/ijmr.2005.7.issue-2.
  • Byman, D. “The Intelligence War on Terrorism.” Intelligence and National Security 29 (2014): 837–863. doi:10.1080/02684527.2013.851876.
  • Chauhan, S., and N. K. Panda. Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques. Amsterdam: Elsevier, 2015.
  • Chen, L.-D., T. Sakaguchi, and M. N. Frolick, “Data Mining Methods, Applications, and Tools,” Information Systems Management ( Winter 2000) http://www.tandfonline.com/doi/abs/10.1201/1078/43190.17.1.20000101/31216.9. doi:10.1201/1078/43190.17.1.20000101/31216.9
  • Clark, R. Intelligence Collection. Thousand Oaks, CA: SAGE Publications, 2014.
  • Clark, R. Intelligence Analysis: A Target-Centric Approach. Thousand Oaks, CA: SAGE Publications, 2017.
  • Clifton, C. “Data Mining.” Encyclopedia Britannica (2009) https://www.britannica.com/technology/data-mining.
  • Crane, C. Cassandra in Oz: Counterinsurgency and Future War. Annapolis, MD: Naval Institute Press, 2016.
  • Cukier, K., and V. Mayer-Schoenberger. “The Rise of Big Data: How It’s Changing the Way We Think About the World.” Foreign Affairs 92 (2013). https://www.foreignaffairs.com/articles/2013-04-03/rise-big-data.
  • DeRosa, M. Data Mining and Data Analysis for Counterterrorism. Washington, DC: CSIS, 2004.
  • Doherty, T. “Should There Be a Human Warfighting Domain (HWD).” Small Wars Journal (2015). December 3. http://smallwarsjournal.com/jrnl/art/should-there-be-a-human-warfighting-domain.
  • Flynn, M., R. Juergens, and T. L. Cantrell. “Employing ISR: SOF Best Practices.” Joint Forces Quarterly 57 (2008): 56–61.
  • FM 3-60. The Targeting Process. Washington, DC: Department of the Army, 2010.
  • Follow up interview with Admiral William McRaven, U.S. Navy retired, May 2015.
  • Follow up interview with General Stanley McChrystal, U.S. Army Retired, Alexandria, VA, May 2015.
  • IBM i2 Analyst’s Notebook https://www.ibm.com/us-en/marketplace/analysts-notebook.
  • Interview with a former senior intelligence officer who was a leader in the synchronization of analysis, intelligence targeting, and operational fusion in TF 714 and similar organizations, December 2017.
  • Interview with Admiral William McRaven, USN retired, Washington, DC, November 2014.
  • Interview with General Stanley McChrystal, U.S. Army retired, Alexandria, VA, July 2014
  • Interview with Lieutenant General Michael Flynn, U.S. Army retired, Alexandria, VA, October 2014.
  • Long, L. “Activity Based Intelligence: Understanding the Unknown.” Intelligencer: Journal of U.S. Intelligence Studies 20 (2013): 7–16.
  • McChrystal, S. My Share of the Task: A Memoir. New York: Penguin Books, 2013.
  • McChrystal, Stanley, Tantum, Collins, David Silverman., and Chris Fussell. Team of Teams: The New Rules of Engagement for an Interconnected World. New York: Portfolio, 2015.
  • Medina, C. “The New Analysis.” In Analyzing Intelligence: Origins, Obstacles, and Innovations, edited by R. Z. George and J. B. Bruce, 238. Washington, DC: Georgetown University Press, 2008.
  • Nakashima, E., and J. Warrick. “For NSA chief, terrorist threat drives passion to ‘collect it all,’.” The Washington Post. 2013 July 14.
  • Ostlund, W. “Irregular Warfare: Counterterrorism Forces in Support of Counterinsurgency Operations,” LAND WARFARE PAPER NO. 91 (September 2012). https://www.usma.edu/dmi/SiteAssets/SitePages/Directors%20Corner/3%20-%20ILWP%2091_Irregular%20Warfare%20-%20CT%20Forces %20in%20Support%20of%20COIN%20Ops%20_1_.pdf.
  • Pendall, D. “Persistent Surveillance and Its Implications for the Common Operating Picture.” Military Review 85 (2005): 41–50.
  • Quinn, K. “A Better Toolbox.” Trajectory, ( Winter, 2012): 10–15.
  • Ressler, S. “Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research.” Homeland Security Affairs 14 (2017). https://www.hsaj.org/articles/171.
  • Sargut, G., and R. G. McGrath. “Learning to Live with Complexity.” Harvard Business Review 89 (2011): 68–76.
  • Shultz, R. The Marines Take Anbar: The Four-Year Fight Against al Qaeda. Annapolis, MD: Naval Institute Press, 2013.
  • Shultz, R. “U.S Counterterrorism Operations during the Iraq War: A Case Study of Task Force 714.” Studies in Conflict and Terrorism 40 (2016): 809–837. doi:10.1080/1057610X.2016.1239990.
  • Smith, R. The Utility of Force: The Art of War in the Modern World. New York: Random House, 2007.
  • Snowden, D., and M. Boone. “A Leader’s Framework for Decision Making.” Harvard Business Review 85 (2007): 1–9.
  • Tactical Site Exploitation and Cache Search Operations Handbook. Ft. Leavenworth, KS: Center for Army Lessons Learned, 2007.
  • Treverton, G. “Creatively Disrupting the Intelligence Paradigm.” International Relations and Security Network, (August 2014). https://www.research-collection.ethz.ch/handle/20.500.11850/90851.
  • U.S. Army Field Manual No. 3-24. Counterinsurgency. Washington, DC: Department of the Army, 2006.
  • U.S. Joint Forces Command. Commander’s Handbook for Attack the Network, Suffolk, VA: Joint Warfighting Center, Joint Doctrine SupportDivision. 2011.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.