- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged intelligence
Insurgency and the Protracted War
From STRATFOR:
By Scott Stewart
In recent weeks, insurgent forces in several countries have been forced to withdraw from territories they once held. Somalia’s al Shabaab, which was pushed out of Mogadishu in October 2011, was ejected from Afmadow on May 30. The group now runs the risk of losing its hold once again on the port city of Kismayo, an important logistical and financial hub for al Shabaab.
In Syria, the Free Syrian Army and other rebel groups were forced out of the city of Idlib and Homs’ Baba Amr district in March. They also withdrew from Al-Haffah on June 13.
Meanwhile in Yemen, al Qaeda in the Arabian Peninsula (AQAP) has been forced to retreat from towns it took control of last year in southern Abyan province, including Jaar, Shaqra and Zinjibar. The organization controlled the area it seized from the government through its Ansar al-Sharia front organization. AQAP was able to capitalize on the infighting that began in Yemen in 2011 and successfully diverted the government’s focus away from AQAP and other militant groups. But in February, the election of new Yemeni President Abd Rabboh Mansour Hadi allowed the rift created by the infighting to be slowly healed. As a result, a combination of Yemeni soldiers and local tribesmen, backed by U.S. intelligence and fire support, have been able to push back AQAP and Ansar al-Sharia in recent weeks. Read the rest of this entry »
‘Dark Angel’ and the Mexican Meth Connection
Posted by Brian in News, Threat Watch on 14/Jun/2012 17:19
From STRATFOR:
By Ben West
In a U.S. operation dubbed “Dark Angel,” local and federal law enforcement officers on May 30 arrested 20 individuals involved in methamphetamine trafficking across five states. Authorities confirmed that the leader of the trafficking network, Armando Mendoza-Haro, has links to Mexico, where the methamphetamine was likely produced. The group appears to have used legitimate companies to transport methamphetamine from California to the Denver area and elsewhere in the Western and Midwestern United States. The group then sent the profits back to California, where the cash was wired to banks in China and the Cayman Islands.
Mexico’s methamphetamine trade seems to be booming these days. Earlier in 2012, the Mexican military made the largest single seizure of methamphetamine ever (15 tons, worth around $1 billion) outside Guadalajara. As the United States increased its restrictions on the pharmaceutical chemicals used to produce methamphetamine, Mexican producers stepped in to meet the growing demand. Details from Operation Dark Angel provide insight into how traffickers in the United States are getting their product to market and, more interestingly, how they are laundering their profits. Read the rest of this entry »
Tensions and Operational Challenges in Pakistan
Posted by Brian in Opinion, Threat Watch on 9/Jun/2012 13:24
By Scott Stewart
On June 4, four U.S. diplomats assigned to the Consulate General of the United States in Peshawar, Pakistan, were stopped at a military checkpoint and temporarily detained after refusing to allow their two vehicles to be searched. The diplomats — including a vice consul — were traveling in a two-vehicle motorcade and were accompanied by three Pakistani Foreign Service National (FSN) security officers.
According to media reports, the Pakistani military has charged that the diplomats had traveled to Malakand without first obtaining permission from the Pakistani government. Malakand is a city located about 120 kilometers (75 miles) northeast of Peshawar in the Khyber-Pakhtunkhwa province, formerly known as the Northwest Frontier Province. Because of the problems Pakistan has had with foreign jihadists in its border badlands, all foreigners are required to obtain something called a No Objection Certificate from Pakistan’s Interior Ministry before visiting areas in Khyber-Pakhtunkhwa and the adjacent Federally Administered Tribal Areas. Furthermore, the Pakistani press noted that the Pakistani military also objected to the Americans and their Pakistani FSNs’ being armed and operating vehicles with fake license plates to disguise the diplomatic vehicles. Read the rest of this entry »
A Serial Bomber in Phoenix
By Scott Stewart
A small improvised explosive device (IED) detonated at a Salvation Army distribution center in Phoenix, Ariz., on the afternoon of May 24. Two Salvation Army employees discovered the explosive device, which was concealed inside a yellow, hand-held 6-volt flashlight, as they were sorting through a box of donated items. The IED exploded when one of the employees picked up the flashlight and attempted to turn it on. The blast was not very powerful, and the two employees suffered only minor injuries.
This was the third incident in the Greater Phoenix area in recent weeks involving an IED concealed in a flashlight. Two explosive devices very similar to the May 24 IED exploded May 13 and May 14 in Glendale, Ariz., a city in the Greater Phoenix metropolitan area. Both devices were abandoned in public places. In the May 13 incident, a woman discovered a yellow, hand-held 6-volt flashlight next to a tree outside a Glendale business. When the woman picked up the flashlight and attempted to turn it on, it exploded, causing minor scratches and bruises to her face and hands. It also inflicted minor wounds to a woman beside her. The next day, a man found an identical flashlight in a ditch where he was working in another part of Glendale. He was lightly injured when the flashlight exploded as he attempted to turn it on. Read the rest of this entry »
The End of Counterinsurgency and the Scalable Force
Posted by Brian in Opinion, Threat Watch on 5/Jun/2012 15:07
From STRATFOR:
By George Friedman
The U.S. military for years has debated the utility of counterinsurgency operations. Drawing from a sentiment that harkens back to the Vietnam War, many within the military have long opposed counterinsurgency operations. Others see counterinsurgency as the unavoidable future of U.S. warfare. The debate is between those who believe the purpose of a conventional military force is to defeat another conventional military force and those who believe conventional military conflicts increasingly will be replaced by conflicts more akin to recent counterinsurgency operations. In such conflicts, the purpose of a counterinsurgency is to transform an occupied society in order to undermine the insurgents.
Understanding this debate requires the understanding that counterinsurgency is not a type of warfare; it is one strategy by which a disproportionately powerful conventional force approaches asymmetric warfare. As its name implies, it is a response to an insurgency, a type of asymmetric conflict undertaken by small units with close links to the occupied population to defeat a larger conventional force. Insurgents typically are highly motivated — otherwise they collapse easily — and usually possess superior intelligence to a foreign occupational force. Small units operating with superior intelligence are able to evade more powerful conventional forces and can strike such forces at their own discretion. Insurgents are not expected to defeat the occupying force through direct military force. Rather, the assumption is that the occupying force has less interest in the outcome of the war than the insurgents and that over time, the inability to defeat the insurgency will compel the occupying force to withdraw. Read the rest of this entry »
Terrorism and the Not-So-Exceptional Individual
Posted by Brian in News, Opinion, Threat Watch on 24/May/2012 16:35
By Scott Stewart
In last week’s Security Weekly, we used a thwarted underwear bomb plot, as well as the U.S. government’s easing the rules of engagement for unmanned aerial vehicle strikes in Yemen, as an opportunity to examine the role of exceptional individuals in militant groups that conduct terrorist attacks. Al Qaeda in the Arabian Peninsula’s (AQAP’s) innovative bombmaker, Ibrahim al-Asiri, is one such individual.
Reported by AP on May 7, the news of the thwarted underwear plot overshadowed another event in Yemen that occurred May 6: a U.S. airstrike in Shabwa province that killed Fahd al-Quso, a Yemeni militant wanted for his involvement in the attack against the USS Cole in October 2000. Al-Quso appeared in a video released by AQAP’s al-Malahim Media in May 2010, during which he threatened attacks against the continental United States, its embassy in Yemen and warships in the waters surrounding Yemen. Read the rest of this entry »
Air and Space – May 2012
This issue of Air and Space includes extensive coverage of the U-2, including its history, the dangers of flying it and how it is still used today.
Searching for Connections Amid Terrorist Threats
Posted by Brian in Opinion, Threat Watch on 10/May/2012 15:45
By Scott Stewart
In past Security Weeklies we have often noted how analyzing terrorism is like assembling a puzzle. After an attack has transpired, it is easier to piece the disparate clues together because you have the luxury of knowing what the finished puzzle should look like. You know the target, the method of attack, the time, the place, etc. These factors frame your approach to the bits of evidence you gather and allow you to assemble them into a cohesive, logical framework. While there will certainly be missing pieces at times, having the reference point of the attack itself is helpful to investigators and analysts.
On the other hand, analyzing a potential threat before an attack takes place is far more difficult. It is like sifting through pieces of thousands of different puzzles, all jumbled together in one big pile, and attempting to create a complete picture without knowing what the end result — the attack — will look like. Sometimes pieces look like they could be related, but it is often difficult to determine if they really are without having the picture of the finished attack and the important framework for investigative reference: target, method of attack, time and place. It is often easy to look back after an attack and criticize authorities for not making a critical connection, but it is difficult to piece things together before the attack occurs without the assistance of hindsight. Read the rest of this entry »
New Spy Program at Pentagon
The Pentagon is taking some of its personnel from the Defense Intelligence Agency and creating a new department that will be known as the Defense Clandestine Service.
From MilitaryTimes.com:
The new service is intended to curb personnel losses, making clandestine work part of the Pentagon’s professional career track and rewarding those who prove successful at operating covertly overseas with further tours and promotions, like their CIA colleagues.
Detecting Terrorist Surveillance
Posted by Brian in News, Threat Watch on 12/Mar/2012 10:00
This is a report from STRATFOR:
By Scott Stewart
As we noted last week, terrorist attacks do not materialize out of thin air. In fact, quite the opposite is true. Those planning terrorist attacks follow a discernable process referred to as the terrorist attack cycle. We also discussed last week how terrorism planners are vulnerable to detection at specific points during their attack cycle and how their poor surveillance tradecraft is one of these vulnerable junctures.
While surveillance is a necessary part of the planning process, the fact that it is a requirement does not necessarily mean that terrorist planners are very good at it. With this in mind, let’s take a closer look at surveillance and discuss what bad surveillance looks like. Read the rest of this entry »
The Covert Intelligence War Against Iran
The Covert Intelligence War Against Iran is republished with permission of STRATFOR.
By Scott Stewart
There has been a lot of talk in the press lately about a “cold war†being waged by the United States, Israel and other U.S. allies against Iran. Such a struggle is certainly taking place, but in order to place recent developments in perspective, it is important to recognize that the covert intelligence war against Iran (and the Iranian response to this war) is clearly not a new phenomenon.
Indeed, STRATFOR has been chronicling this struggle since early 2007. Our coverage has included analyses of events such as the defection to the West of Iranian officials with knowledge of Tehran’s nuclear program; the Iranian seizure of British servicemen in the Shatt al Arab Waterway; the assassination of Iranian nuclear scientists; the use of the Stuxnet worm to cripple Iranian uranium enrichment efforts; and Iranian efforts to arm its proxies and use them as a threat to counteract Western pressure. These proxies are most visible in Iraq and Lebanon, but they also exist in Yemen, Afghanistan, Syria, the Palestinian territories, Saudi Arabia and other Gulf states.
While the covert intelligence war has been under way for many years, the tempo of events that can readily be identified as part of it has been increasing over the past few months. It is important to note that many of these events are the result of hidden processes begun months or even years previously, so while visible events may indeed be increasing, the efforts responsible for many of them began to increase much earlier. What the activities of recent months do tell us is that the covert war between Iran and its enemies will not be diminishing anytime soon. If anything, with the current withdrawal of U.S. troops from Iraq and Iranian nuclear efforts continuing, we likely will see the results of additional covert operations — and evidence of the clandestine activity required to support those operations. Read the rest of this entry »
Fighting Grassroots Terrorism: How Local Vigilance Can Help
Posted by Brian in News, Threat Watch on 8/Aug/2011 12:09
This report is republished with the permission of STRATFOR.
By Scott Stewart
In the wake of the July 22 Oslo attacks, as I have talked with people in the United States and Europe, I have noticed two themes in the conversations. The first is the claim that the attacks came from an unexpected source and were therefore impossible to stop. The second theme is that detecting such attacks is the sole province of dedicated counterterrorism authorities.
As discussed in last week’s Security Weekly, even in so-called unexpected attacks there are specific operational tasks that must be executed in order to conduct an operation. Such tasks can be detected, and unexpected attacks emanating from lone wolf actors can indeed be thwarted if such indicators are being looked for. Alleged Oslo attack perpetrator Anders Breivik reportedly conducted several actions that would have made him vulnerable to detection had the authorities been vigilant and focused on those possible actions.
This is why it is critical to look at the mechanics of attacks in order to identify the steps that must be undertaken to complete them and then focus on identifying people taking such steps. Focusing on the “how†rather than the “who†is an effective way for authorities to get on the proactive side of the action/reaction continuum.
Considering this concept of focusing on the how, one quickly reaches a convergence with the second theme, which involves the role and capabilities of dedicated counterterrorism resources. The primary agency tasked with counterterrorism in most countries tends to have limited resources that are stretched thin trying to cover known or suspected threats. These agencies simply do not have the manpower to look for attack-planning indicators — especially in a world where militant actors are increasingly adopting the leaderless-resistance model, which is designed to avoid detection by counterterrorism forces. Read the rest of this entry »
Raw Intelligence Report: Conditions in Baghdad
Posted by Brian in News, Threat Watch on 14/Jun/2011 13:28
This is a report from Stratfor Global Intelligence
June 13, 2011
Editor’s Note: What follows is raw insight from a STRATFOR source in Baghdad, Iraq. The following does not reflect STRATFOR’s view, but provides a perspective on the situation in Baghdad.
After the fall of Baghdad in 2003, the city was a nice place despite the lack of law enforcement and government. By February 2004, most businesses were operating, people were happy and stores were open until midnight. There was no shortage of fuel, and electricity was more reliable. The city was very clean, and the crime rate was low. There was also no fear of kidnapping or car bombs. It was a functioning city with law, even without law enforcement. There was even a lion in the Baghdad Zoo, though I heard it later died.
On March 2, 2004, explosions shook the Shiite Kazimiyah district, killing tens and wounding hundreds. These explosions were the start of more attacks and car bombings between the Shia and Sunnis that increased in later years. In 2003 and 2004, Baghdad was a city where I envisioned living permanently one day. That is not the case now.
The roads are in very poor condition, with lots of garbage everywhere — some of it dating back to 2003. Many streets are blocked with concrete walls. There are many checkpoints inside the city manned by soldiers and police, but they did not seem to be well trained or prepared for potential threats. I hardly saw them checking cars or asking people for identification. We drove 400 kilometers (250 miles) and encountered more than 26 checkpoints; none of them stopped us to ask for identification. The soldiers and police at the checkpoints do not seem to be loyal to the Iraqi state but are there to get their salaries and make a living. The taxi driver told me that since the government does not enforce the law, the soldiers do not want to ask for identification and hold people accountable because they fear reprisals later. Therefore, they let everyone go and avoid problems. Read the rest of this entry »
The Bin Laden Operation: Tapping Human Intelligence
Posted by Brian in Opinion, Threat Watch on 26/May/2011 17:29
The Bin Laden Operation: Tapping Human Intelligence is republished with permission of STRATFOR.
By Fred Burton
Since May 2, when U.S. special operations forces crossed the Afghan-Pakistani border and killed Osama bin Laden, international media have covered the raid from virtually every angle. The United States and Pakistan have also squared off over the U.S. violation of Pakistan’s sovereign territory and Pakistan’s possible complicity in hiding the al Qaeda leader. All this surface-level discussion, however, largely ignores almost 10 years of intelligence development in the hunt for bin Laden.
While the cross-border nighttime raid deep into Pakistan was a daring and daunting operation, the work to find the target — one person out of 180 million in a country full of insurgent groups and a population hostile to American activities on its soil — was a far greater challenge. For the other side, the challenge of hiding the world’s most wanted man from the world’s most funded intelligence apparatus created a clandestine shell game that probably involved current or former Pakistani intelligence officers as well as competing intelligence services. The details of this struggle will likely remain classified for decades.
Examining the hunt for bin Laden is also difficult, mainly because of the sensitivity of the mission and the possibility that some of the public information now available could be disinformation intended to disguise intelligence sources and methods. Successful operations can often compromise human sources and new intelligence technologies that have taken years to develop. Because of this, it is not uncommon for intelligence services to try to create a wilderness of mirrors to protect sources and methods. But using open-source reporting and human intelligence from STRATFOR’s own sources, we can assemble enough information to draw some conclusions about this complex intelligence effort and raise some key questions. Read the rest of this entry »