Image for Counterterrorism and threat finance analysis during wartime

Counterterrorism and threat finance analysis during wartime

McKiernan, David D.(Foreword by)Bahney, Benjamin(Contributions by)Blum, David M.(Contributions by)Conway, J. Edward(Contributions by)Gordon, Brian A.(Contributions by)McKiernan, General David(Contributions by)Shatz, Howard J.(Contributions by)Sheffield, Colonel Clayton O.(Contributions by)Blum, David M.(Edited by)Conway, J. Edward(Edited by)
See all formats and editions

This edited volume describes various analytic methods used by intelligence analysts supporting military operations in Iraq and Afghanistan as members of the Iraq and Afghan Threat Finance Cells-interagency intelligence teams tasked to disrupt terrorist and insurgent funding.

All contributors have deployed to Iraq and/or Afghanistan and detail both the bureaucratic and intellectual challenges in understanding terrorist and insurgent finance networks and then designing operations to attack such networks via conventional military operations, Special Forces kill/capture targeting operations, and non-kinetic operations such as asset freezing or diplomacy.

The analytic methods described here leverage both quantitative and qualitative methods, but in a language and style accessible to those without a quantitative background.

All methods are demonstrated via actual case studies (approved for release by the U.S. government) drawn from the analysts' distinct experiences while deployed.

This book will be of interest to current or aspiring intelligence analysts, students of security studies, anti-money laundering specialists in the private sector, and more generally to those interested in understanding how intelligence analysis feeds into live operations during wartime at a very tactical level.

Read More
Special order line: only available to educational & business accounts. Sign In
£131.00
Product Details
Lexington Books
0739180444 / 9780739180440
eBook (Adobe Pdf)
22/01/2015
English
225 pages
Copy: 10%; print: 10%
Description based on CIP data; resource not viewed.