Red Teams and Counterterrorism Training

Red Teams and Counterterrorism Training

Author: Stephen Sloan

Publisher: University of Oklahoma Press

Published: 2012-09-14

Total Pages: 220

ISBN-13: 0806186445

DOWNLOAD EBOOK

Keeping ahead of terrorists requires innovative, up-to-date training. This follow-up to Stephen Sloan's pioneering 1981 book, Simulating Terrorism, takes stock of twenty-first-century terrorism—then equips readers to effectively counter it. Quickly canvassing the evolution of terrorism—and of counterterrorism efforts—over the past thirty years, co-authors Sloan and Robert J. Bunker draw on examples from the early 2000s, following the World Trade Center and Pentagon attacks, to emphasize the need to prevent or respond quickly to "active aggressors"—terrorists who announce their presence and seek credibility through killing. Training for such situations requires realistic simulations—whose effectiveness, the authors show, depends on incorporating red teams; that is, the groups that play the part of active aggressors. In Red Teams and Counterterrorism Training, Sloan and Bunker, developers of simulation-driven counterterrorist training, take readers through the prerequisites for and basic principles of conducting a successful simulation and preparing responders to face threats—whether from teenage shooters or from sophisticated terrorist organizations. The authors clearly explain how to create an effective red team whose members can operate from within the terrorists' mindset. An innovative chapter by theater professional Roberta Sloan demonstrates how to use dramatic techniques to teach red teams believable role-playing. Rounding out this book, a case study of the 2009 shooting at Fort Hood illustrates the cost of failures in intelligence and underscores the still-current need for serious attention to potential threats. First responders—whether civilian or military—will find Red Teams and Counterterrorism Training indispensible as they address and deter terrorism now and in the future.


Book Synopsis Red Teams and Counterterrorism Training by : Stephen Sloan

Download or read book Red Teams and Counterterrorism Training written by Stephen Sloan and published by University of Oklahoma Press. This book was released on 2012-09-14 with total page 220 pages. Available in PDF, EPUB and Kindle. Book excerpt: Keeping ahead of terrorists requires innovative, up-to-date training. This follow-up to Stephen Sloan's pioneering 1981 book, Simulating Terrorism, takes stock of twenty-first-century terrorism—then equips readers to effectively counter it. Quickly canvassing the evolution of terrorism—and of counterterrorism efforts—over the past thirty years, co-authors Sloan and Robert J. Bunker draw on examples from the early 2000s, following the World Trade Center and Pentagon attacks, to emphasize the need to prevent or respond quickly to "active aggressors"—terrorists who announce their presence and seek credibility through killing. Training for such situations requires realistic simulations—whose effectiveness, the authors show, depends on incorporating red teams; that is, the groups that play the part of active aggressors. In Red Teams and Counterterrorism Training, Sloan and Bunker, developers of simulation-driven counterterrorist training, take readers through the prerequisites for and basic principles of conducting a successful simulation and preparing responders to face threats—whether from teenage shooters or from sophisticated terrorist organizations. The authors clearly explain how to create an effective red team whose members can operate from within the terrorists' mindset. An innovative chapter by theater professional Roberta Sloan demonstrates how to use dramatic techniques to teach red teams believable role-playing. Rounding out this book, a case study of the 2009 shooting at Fort Hood illustrates the cost of failures in intelligence and underscores the still-current need for serious attention to potential threats. First responders—whether civilian or military—will find Red Teams and Counterterrorism Training indispensible as they address and deter terrorism now and in the future.


Red Team

Red Team

Author: Micah Zenko

Publisher: Basic Books

Published: 2015-11-03

Total Pages: 336

ISBN-13: 0465073956

DOWNLOAD EBOOK

Essential reading for business leaders and policymakers, an in-depth investigation of red teaming, the practice of inhabiting the perspective of potential competitors to gain a strategic advantage Red teaming. The concept is as old as the Devil's Advocate, the eleventh-century Vatican official charged with discrediting candidates for sainthood. Today, red teams are used widely in both the public and the private sector by those seeking to better understand the interests, intentions, and capabilities of institutional rivals. In the right circumstances, red teams can yield impressive results, giving businesses an edge over their competition, poking holes in vital intelligence estimates, and troubleshooting dangerous military missions long before boots are on the ground. But not all red teams are created equal; indeed, some cause more damage than they prevent. Drawing on a fascinating range of case studies, Red Team shows not only how to create and empower red teams, but also what to do with the information they produce. In this vivid, deeply-informed account, national security expert Micah Zenko provides the definitive book on this important strategy -- full of vital insights for decision makers of all kinds.


Book Synopsis Red Team by : Micah Zenko

Download or read book Red Team written by Micah Zenko and published by Basic Books. This book was released on 2015-11-03 with total page 336 pages. Available in PDF, EPUB and Kindle. Book excerpt: Essential reading for business leaders and policymakers, an in-depth investigation of red teaming, the practice of inhabiting the perspective of potential competitors to gain a strategic advantage Red teaming. The concept is as old as the Devil's Advocate, the eleventh-century Vatican official charged with discrediting candidates for sainthood. Today, red teams are used widely in both the public and the private sector by those seeking to better understand the interests, intentions, and capabilities of institutional rivals. In the right circumstances, red teams can yield impressive results, giving businesses an edge over their competition, poking holes in vital intelligence estimates, and troubleshooting dangerous military missions long before boots are on the ground. But not all red teams are created equal; indeed, some cause more damage than they prevent. Drawing on a fascinating range of case studies, Red Team shows not only how to create and empower red teams, but also what to do with the information they produce. In this vivid, deeply-informed account, national security expert Micah Zenko provides the definitive book on this important strategy -- full of vital insights for decision makers of all kinds.


Surprise Attack

Surprise Attack

Author: Larry Hancock

Publisher: Catapult

Published: 2016-09-13

Total Pages: 577

ISBN-13: 161902795X

DOWNLOAD EBOOK

Surprise Attack explores sixty plus years of military and terror threats against the United States. It examines the intelligence tools and practices that provided warnings of those attacks and evaluates the United States' responses, both in preparedness – and most importantly – the effectiveness of our military and national command authority. Contrary to common claims, the historical record now shows that warnings, often very solid warnings, have preceded almost all such attacks, both domestic and international. Intelligence practices developed early in the Cold War, along with intelligence collection techniques have consistently produced accurate warnings for our national security decision makers. Surprise Attack traces the evolution and application of those practices and explores why such warnings have often failed to either interdict or intercept actual attacks. Going beyond warnings, Surprise Attack explores the real world performance of the nation's military and civilian command and control history – exposing disconnects in the chain of command, failures of command and control and fundamental performance issues with national command authority. America has faced an ongoing series of threats, from the attacks on Hawaii and the Philippines in 1941, through the crises and confrontations of the Cold War, global attacks on American personnel and facilities to the contemporary violence of jihadi terrorism. With a detailed study of those threats, the attacks related to them, and America's response, a picture of what works – and what doesn't – emerges. The attacks have been tragic and we see the defensive preparations and response often ineffective. Yet lessons can be learned from the experience; Surprise Attack represents a comprehensive effort to identify and document those lessons.


Book Synopsis Surprise Attack by : Larry Hancock

Download or read book Surprise Attack written by Larry Hancock and published by Catapult. This book was released on 2016-09-13 with total page 577 pages. Available in PDF, EPUB and Kindle. Book excerpt: Surprise Attack explores sixty plus years of military and terror threats against the United States. It examines the intelligence tools and practices that provided warnings of those attacks and evaluates the United States' responses, both in preparedness – and most importantly – the effectiveness of our military and national command authority. Contrary to common claims, the historical record now shows that warnings, often very solid warnings, have preceded almost all such attacks, both domestic and international. Intelligence practices developed early in the Cold War, along with intelligence collection techniques have consistently produced accurate warnings for our national security decision makers. Surprise Attack traces the evolution and application of those practices and explores why such warnings have often failed to either interdict or intercept actual attacks. Going beyond warnings, Surprise Attack explores the real world performance of the nation's military and civilian command and control history – exposing disconnects in the chain of command, failures of command and control and fundamental performance issues with national command authority. America has faced an ongoing series of threats, from the attacks on Hawaii and the Philippines in 1941, through the crises and confrontations of the Cold War, global attacks on American personnel and facilities to the contemporary violence of jihadi terrorism. With a detailed study of those threats, the attacks related to them, and America's response, a picture of what works – and what doesn't – emerges. The attacks have been tragic and we see the defensive preparations and response often ineffective. Yet lessons can be learned from the experience; Surprise Attack represents a comprehensive effort to identify and document those lessons.


Counterintelligence Theory and Practice

Counterintelligence Theory and Practice

Author: Hank Prunckun

Publisher: Rowman & Littlefield

Published: 2012

Total Pages: 257

ISBN-13: 1442219114

DOWNLOAD EBOOK

Counterintelligence Theory and Practice explores issues relating to national security, military, law enforcement, and corporate, as well as private affairs. Hank Prunckun uses his own experience as a counterintelligence professional to provide both a theoretical base and practical explanations for counterintelligence.


Book Synopsis Counterintelligence Theory and Practice by : Hank Prunckun

Download or read book Counterintelligence Theory and Practice written by Hank Prunckun and published by Rowman & Littlefield. This book was released on 2012 with total page 257 pages. Available in PDF, EPUB and Kindle. Book excerpt: Counterintelligence Theory and Practice explores issues relating to national security, military, law enforcement, and corporate, as well as private affairs. Hank Prunckun uses his own experience as a counterintelligence professional to provide both a theoretical base and practical explanations for counterintelligence.


Knowledge Discovery for Counterterrorism and Law Enforcement

Knowledge Discovery for Counterterrorism and Law Enforcement

Author: David Skillicorn

Publisher: CRC Press

Published: 2008-11-13

Total Pages: 352

ISBN-13: 1420074008

DOWNLOAD EBOOK

Most of the research aimed at counterterrorism, fraud detection, or other forensic applications assumes that this is a specialized application domain for mainstream knowledge discovery. Unfortunately, knowledge discovery changes completely when the datasets being used have been manipulated in order to conceal some underlying activity. Knowledge Dis


Book Synopsis Knowledge Discovery for Counterterrorism and Law Enforcement by : David Skillicorn

Download or read book Knowledge Discovery for Counterterrorism and Law Enforcement written by David Skillicorn and published by CRC Press. This book was released on 2008-11-13 with total page 352 pages. Available in PDF, EPUB and Kindle. Book excerpt: Most of the research aimed at counterterrorism, fraud detection, or other forensic applications assumes that this is a specialized application domain for mainstream knowledge discovery. Unfortunately, knowledge discovery changes completely when the datasets being used have been manipulated in order to conceal some underlying activity. Knowledge Dis


Body Cavity Bombers: the New Martyrs

Body Cavity Bombers: the New Martyrs

Author: Christopher Flaherty

Publisher: iUniverse

Published: 2013-08-23

Total Pages: 363

ISBN-13: 1491703113

DOWNLOAD EBOOK

authoritative account of a significant new terrorist tactic that is likely to become more pervasive in our increasingly sophisticated technological and medical age in which it is becoming easier for the terrorist adversary to use the types of body cavity bombs that will be capable of evading detection technologies ... Dr. Joshua Sinai, Washington, DC-based consultant on counterterrorism studies and author of Active Shooter: A Handbook on Prevention. Body Cavity Bombers shows how what was once a lurid Hollywood fantasy has emerged as a legitimate threat, dissects the risk with clinical precision, and soberly considers the remediation options. Dr. Nils Gilman, Director of Research at Monitor 360 and co-editor of Deviant Globalization. A timely and important book about a disgusting subject. In showing how the human body might be used to carry and conceal explosive devices, terrorism experts Bunker and Flaherty have left no stone unturned. Dr. Martin van Creveld, one of the worlds leading writers on military history and strategy, with a special interest in the future of war, and author of twenty books including The Transformation of War. Those in the front line of identifying and taking necessary action to counter these new techniques of destruction would be well advised to read Dr. Bunker and Dr. Flahertys realistic assessment. Dr. Stephen Sloan, internationally recognized terrorism scholar and author/co-author of fourteen books on terrorism.


Book Synopsis Body Cavity Bombers: the New Martyrs by : Christopher Flaherty

Download or read book Body Cavity Bombers: the New Martyrs written by Christopher Flaherty and published by iUniverse. This book was released on 2013-08-23 with total page 363 pages. Available in PDF, EPUB and Kindle. Book excerpt: authoritative account of a significant new terrorist tactic that is likely to become more pervasive in our increasingly sophisticated technological and medical age in which it is becoming easier for the terrorist adversary to use the types of body cavity bombs that will be capable of evading detection technologies ... Dr. Joshua Sinai, Washington, DC-based consultant on counterterrorism studies and author of Active Shooter: A Handbook on Prevention. Body Cavity Bombers shows how what was once a lurid Hollywood fantasy has emerged as a legitimate threat, dissects the risk with clinical precision, and soberly considers the remediation options. Dr. Nils Gilman, Director of Research at Monitor 360 and co-editor of Deviant Globalization. A timely and important book about a disgusting subject. In showing how the human body might be used to carry and conceal explosive devices, terrorism experts Bunker and Flaherty have left no stone unturned. Dr. Martin van Creveld, one of the worlds leading writers on military history and strategy, with a special interest in the future of war, and author of twenty books including The Transformation of War. Those in the front line of identifying and taking necessary action to counter these new techniques of destruction would be well advised to read Dr. Bunker and Dr. Flahertys realistic assessment. Dr. Stephen Sloan, internationally recognized terrorism scholar and author/co-author of fourteen books on terrorism.


Counterterrorism: Bridging Operations and Theory

Counterterrorism: Bridging Operations and Theory

Author: Robert J. Bunker

Publisher: iUniverse

Published: 2015-02-10

Total Pages: 482

ISBN-13: 149175978X

DOWNLOAD EBOOK

Counterterrorism/Homeland Security/Security Studies Contributors: Dr. John Arquilla • Jeffrey “Skunk” Baxter • Matt Begert • Dr. Stefan Brem • Michael Brooks • Dr. Robert J. Bunker • Rick Y. Byrum • Lisa J. Campbell • Irina A. Chindea • Dr. Martin van Creveld • James P. Denney • Matthew G. Devost • T. Kessara Eldridge • Adam Elkus • Dr. Fadi Essmaeel • Dr. Christopher Flaherty • Phillip W. Fouts • Dr. Daveed Gartenstein-Ross • Dr. Russell W. Glenn • Scott Gerwehr • Dr. Lester W. Grau • Thomas Greco • Dr. Daniel S. Gressang IV • Dr. Rohan Gunaratna • Dr. Thomas X. Hammes • Jennifer (Demmert) Hardwick • Daniel P. Heenan • Dr. Brian K. Houghton • Ali A. Jalali • Brian Michael Jenkins • Dr. Peter Katona • Hal Kempfer • Dr. David Kilcullen • James T. Kirkhope • Dr. Scott P. Layne • Ernest (Ernie) J. Lorelli • Dr. Prem Mahadevan • Paul M. Maniscalco • Kevin R. McCarthy • Jason Pate • William C. Patrick III • Ralph Peters • Dr. Raymond Picquet • Caitlin Poling • Byron Ramirez • John Robb • Dr. David Ronfeldt • Mitchell D. Silber • Dr. Joshua Sinai • Dr. Erroll G. Southers • Dr. John P. Sullivan • Michael Tanji • Dr. Gregory F. Treverton • Donald E. Vandergriff • G.I. Wilson


Book Synopsis Counterterrorism: Bridging Operations and Theory by : Robert J. Bunker

Download or read book Counterterrorism: Bridging Operations and Theory written by Robert J. Bunker and published by iUniverse. This book was released on 2015-02-10 with total page 482 pages. Available in PDF, EPUB and Kindle. Book excerpt: Counterterrorism/Homeland Security/Security Studies Contributors: Dr. John Arquilla • Jeffrey “Skunk” Baxter • Matt Begert • Dr. Stefan Brem • Michael Brooks • Dr. Robert J. Bunker • Rick Y. Byrum • Lisa J. Campbell • Irina A. Chindea • Dr. Martin van Creveld • James P. Denney • Matthew G. Devost • T. Kessara Eldridge • Adam Elkus • Dr. Fadi Essmaeel • Dr. Christopher Flaherty • Phillip W. Fouts • Dr. Daveed Gartenstein-Ross • Dr. Russell W. Glenn • Scott Gerwehr • Dr. Lester W. Grau • Thomas Greco • Dr. Daniel S. Gressang IV • Dr. Rohan Gunaratna • Dr. Thomas X. Hammes • Jennifer (Demmert) Hardwick • Daniel P. Heenan • Dr. Brian K. Houghton • Ali A. Jalali • Brian Michael Jenkins • Dr. Peter Katona • Hal Kempfer • Dr. David Kilcullen • James T. Kirkhope • Dr. Scott P. Layne • Ernest (Ernie) J. Lorelli • Dr. Prem Mahadevan • Paul M. Maniscalco • Kevin R. McCarthy • Jason Pate • William C. Patrick III • Ralph Peters • Dr. Raymond Picquet • Caitlin Poling • Byron Ramirez • John Robb • Dr. David Ronfeldt • Mitchell D. Silber • Dr. Joshua Sinai • Dr. Erroll G. Southers • Dr. John P. Sullivan • Michael Tanji • Dr. Gregory F. Treverton • Donald E. Vandergriff • G.I. Wilson


Narcoterrorism and Impunity in the Americas

Narcoterrorism and Impunity in the Americas

Author: Robert J. Bunker

Publisher: Xlibris Corporation

Published: 2016-10-06

Total Pages: 414

ISBN-13: 1524545635

DOWNLOAD EBOOK

The fifth Small Wars Journal—El Centro anthology spans online journal and blog writings for all of 2015 with a thematic focus on narcoterrorism and impunity in the Americas. This anthology is composed of an About SWJ and Foundation section; a memoriam to our friend and colleague, George W. Grayson; an acronym listing; a foreword; an introduction; twenty-eight chapters; a postscript; anthology notes; and notes on its twenty-three academic, governmental, and professional contributors.


Book Synopsis Narcoterrorism and Impunity in the Americas by : Robert J. Bunker

Download or read book Narcoterrorism and Impunity in the Americas written by Robert J. Bunker and published by Xlibris Corporation. This book was released on 2016-10-06 with total page 414 pages. Available in PDF, EPUB and Kindle. Book excerpt: The fifth Small Wars Journal—El Centro anthology spans online journal and blog writings for all of 2015 with a thematic focus on narcoterrorism and impunity in the Americas. This anthology is composed of an About SWJ and Foundation section; a memoriam to our friend and colleague, George W. Grayson; an acronym listing; a foreword; an introduction; twenty-eight chapters; a postscript; anthology notes; and notes on its twenty-three academic, governmental, and professional contributors.


Cartel Car Bombings in Mexico

Cartel Car Bombings in Mexico

Author: Robert J. Bunker

Publisher: Army War College Press

Published: 2013

Total Pages: 76

ISBN-13:

DOWNLOAD EBOOK

Contemporary Mexican cartel use of car bombs began in mid-July 2010 and has since escalated. Given the proximity to the United States, some literally within miles of the border, the car bombings, with about 20 incidents identified over the last 2 1/2 years, should be of interest to local, state, and federal U.S. law enforcement, the U.S. Army, and other governmental institutions which are providing increasing support to Mexican federal agencies. An historical overview and analysis of cartel car bomb use in Mexico provides context, insights, and lessons learned stemming from the Medellin and Cali cartel car bombing campaigns. In order to generate insights into future cartel car bombings in Mexico, the identification of such potentials offers a glimpse into cartel "enemy intent," a possible form of actionable strategic intelligence. For Mexico, steady and both slowly and quickly increasing car bomb use trajectories may exist. The prognosis for decreasing car bomb deployment appears unlikely. If cartel car bombs were to be deployed on U.S. soil or against U.S. personnel and facilities in Mexico, such as our consulates, we could expect that a pattern of indications and warnings (I&W) would be evident prior to such an attack(s). In that case, I&W would be drawn from precursor events such as grenade and improvised explosive device (IED) attacks (or attempted attacks) on our personnel and facilities and on evolving cartel car bomb deployment patterns in Mexico. The authors conclude with initial recommendations for U.S. Army and defense community support to the military and the federal, state, and local police agencies of the Mexican state, and the various U.S. federal, state, and local police agencies operating near the U.S.-Mexican border. The extent of support in intelligence, organization, training, and equipment is highlighted, as well as the extent that these forms of support should be implemented to counter cartel vehicle-borne IEDs and overall cartel threats.


Book Synopsis Cartel Car Bombings in Mexico by : Robert J. Bunker

Download or read book Cartel Car Bombings in Mexico written by Robert J. Bunker and published by Army War College Press. This book was released on 2013 with total page 76 pages. Available in PDF, EPUB and Kindle. Book excerpt: Contemporary Mexican cartel use of car bombs began in mid-July 2010 and has since escalated. Given the proximity to the United States, some literally within miles of the border, the car bombings, with about 20 incidents identified over the last 2 1/2 years, should be of interest to local, state, and federal U.S. law enforcement, the U.S. Army, and other governmental institutions which are providing increasing support to Mexican federal agencies. An historical overview and analysis of cartel car bomb use in Mexico provides context, insights, and lessons learned stemming from the Medellin and Cali cartel car bombing campaigns. In order to generate insights into future cartel car bombings in Mexico, the identification of such potentials offers a glimpse into cartel "enemy intent," a possible form of actionable strategic intelligence. For Mexico, steady and both slowly and quickly increasing car bomb use trajectories may exist. The prognosis for decreasing car bomb deployment appears unlikely. If cartel car bombs were to be deployed on U.S. soil or against U.S. personnel and facilities in Mexico, such as our consulates, we could expect that a pattern of indications and warnings (I&W) would be evident prior to such an attack(s). In that case, I&W would be drawn from precursor events such as grenade and improvised explosive device (IED) attacks (or attempted attacks) on our personnel and facilities and on evolving cartel car bomb deployment patterns in Mexico. The authors conclude with initial recommendations for U.S. Army and defense community support to the military and the federal, state, and local police agencies of the Mexican state, and the various U.S. federal, state, and local police agencies operating near the U.S.-Mexican border. The extent of support in intelligence, organization, training, and equipment is highlighted, as well as the extent that these forms of support should be implemented to counter cartel vehicle-borne IEDs and overall cartel threats.


China’s Securing, Shaping, and Exploitation of Strategic Spaces: Gray Zone Response and Counter-Shi Strategies

China’s Securing, Shaping, and Exploitation of Strategic Spaces: Gray Zone Response and Counter-Shi Strategies

Author: Robert J. Bunker

Publisher: Xlibris Corporation

Published: 2019-12-23

Total Pages: 154

ISBN-13: 1796077860

DOWNLOAD EBOOK

The timing of Dr. Robert J. Bunker’s new SWJ pocket book is apropos given the increasing intransigence of the Chinese Communist Party (CCP) in both its domestic ‘police state’ security policies and foreign ‘expansionistic’ economic and military activities. This authoritarian regime—bereft of its former Marxist and Maoist ideologies except in name only—under the iron fisted leadership of ‘president for life’ Xi Jinping is increasingly in the news for the many draconian and predatory behaviors and actions in which it is now engaging. Dave Dilegge Editor-in-Chief Small Wars Journal


Book Synopsis China’s Securing, Shaping, and Exploitation of Strategic Spaces: Gray Zone Response and Counter-Shi Strategies by : Robert J. Bunker

Download or read book China’s Securing, Shaping, and Exploitation of Strategic Spaces: Gray Zone Response and Counter-Shi Strategies written by Robert J. Bunker and published by Xlibris Corporation. This book was released on 2019-12-23 with total page 154 pages. Available in PDF, EPUB and Kindle. Book excerpt: The timing of Dr. Robert J. Bunker’s new SWJ pocket book is apropos given the increasing intransigence of the Chinese Communist Party (CCP) in both its domestic ‘police state’ security policies and foreign ‘expansionistic’ economic and military activities. This authoritarian regime—bereft of its former Marxist and Maoist ideologies except in name only—under the iron fisted leadership of ‘president for life’ Xi Jinping is increasingly in the news for the many draconian and predatory behaviors and actions in which it is now engaging. Dave Dilegge Editor-in-Chief Small Wars Journal