click here

advertisement
CONTENTS
Part-I
“CLASSICAL INTELLIGENCE”
CHAPTER I. FUNDAMENTALS OF INTELLIGENCE
(1.1.).
(1.2).
(1.3).
(1.3.1).
(1.3.2)
(1.4).
(1 4.l).
(1.4.2).
(1.5).
(1.5.1).
(1.6).
(1.6.1).
WHAT IS INTELLIGENCE
WHY DO NATIONS NEED INTELLIGENCE
VARIOUS LEVELS AND TYPES OF INTELLIGENCE
Strategic, operational and tactical Levels
Miscellaneous types of intelligence
INTELLIGENCE COLLECTION DISCIPLINES
Human intelligence (HUMINT)
Open source intelligence (OSINT)
THE INTELLIGENCE CYCLE
The great significance of analysis in the production of good intelligence
INTELLIGENCE IN MILITARY CONTEXT
Characteristics of effective military intelligence
References
CHAPTER II. ESPIONAGE: THEORY, TRADECRAFT AND PRACTICE
(2.1).
(2.1.1).
(2.1.2).
(2.2).
(2.2.1).
(2.2.2).
(2.3).
(2.3.1).
(2.3.2)..
(2.4).
(2.4.1).
(2.4.2).
(2.4.3).
(2.4.4).
(2.5).
A BRIEF HISTORY OF ESPIONAGE
Espionage in ancient India
Espionage in the Western world and elsewhere
INTELLIGENCE OBTAINED THROUGH ESPIONAGE: ADVANTAGES
AND LIMITATIONS
Advantages
Limitations
THEORY OF ESPIONAGE: WHY DO PEOPLE BECOME SPIES
Motivating and causal factors
Vulnerable personality profiles
ESPIONAGE TRADECRAFT: COMPONENTS ANDSKILLS
From talent-spotting to debriefing agents
Communicating with agents
Operations
.
Surveillance, anti-surveillance and countersurveillance
ESPIONAGE IN PRACTICE: INDIAN PROBLEMS
References
CHAPTER III. COUNTERINTELLIGENCE: SECURITY FROM HOSTILE
INTELLIGENCE ACTIVITIES
(3.1).
(3.1.1).
(3.2).
DEFINITION AND SIGNIFICANCE OF COUNTERINTELLIGENCE
Various facets of counterintelligence
COUNTERINTELLIGENCE IN PRACTICE
(3.2.1).
(3.2.2).
(3.2.3).
(3.3).
(3.4).
(3.5).
(3.5.1).
(3.5.2).
Intricacies of CI work
Offensive counterintelligence techniques
(a).
Basic techniques
(b).
Counterespionage techniques
(c).
Advanced techniques
Defensive counterintelligence techniques
PITFALLS IN COUNTERINTELLIGENCE: LESSONS DRAWN FROM
ACROSS THE WORLD
THE THIN LINE BETWEEN THE USE AND ABUSE OF
COUNTERINTELLIGENCE
COUNTERINTELLIGENCE IN MILITARY CONTEXT
Roles and functions
C-HUMINT, C-SIGINT and C-IMINT
References
CHAPTER IV. THE SOBER TRUTH ABOUT COVERT ACTION
(4.1).
(4.2).
(4.2.1).
(4.2.2).
(4.2.3).
(4.3).
(4.4).
(4.5).
COVERT ACTION: AN INTRODUCTION
THE MECHANICS OF COVERT ACTION
Psychological actions
Political actions
Paramilitary actions
CRITIQUE OF COVERT ACTION
IN DEFENCE OF COVERT ACTION
COVERT ACTION IN INDIAN CONTEXT
References
Part II
“QUALITY CONTROL IN INTELLIGENCE”
CHAPTER V. WHEN INTELLIGENCE BECOMES UNINTELLIGENT
(5.1).
(5.1.1).
(5.1.2).
(5.1.3).
(5.1.4).
(5.1.5).
(5.1.6).
(5.1.7).
VARIOUS DIMENSIONS OF VACUOUSNESS IN INTELLIGENCE
Sensational flights of fancy
A self-supporting nexus of intelligence agencies, media, and politicians
“Tailored” intelligence
Deliberately propagating false notions and myths
A jargonised version of speculative media reports
(a).
The “current events” syndrome
The problem of intellectually handicapped consumers
Various vays in which impoverished contents are reflected
(a).
Stating the obvious
(b).
The vague and the unverifiable
(c).
The art of the impossible
(d).
A false claim to the heart of the matter
(e).
The long shots
(5.2).
(5.2.1).
(5.2.2).
(5.2.3).
(5.2.4).
(5.2.5).
(5.2.6).
(5.2.7).
(5.3).
(5.3.1).
(5.3.2).
(5.3.3).
(f).
Simple intellectual bankruptcy
SYSTEMIC DEFECTS: ISSUES IN MANAGEMENT OF INTELLIGENCE
Imbalanced emphasis on different modes of intelligence collection
Corroboration by default
Inherent problem of intelligence collectors’ narrow vision and limited
understanding
Lack of consumer guidance and evaluation
Biases introduced by extraneous influences
Analysis: The Achilles Heel
Problem of unrealistic expectations from intelligence
SOME HISTORIC HOWLERS
The Kargil experience
Intelligence non sequitur: Some recent examples
Intelligence that let us down: Some past examples References
CHAPTER VI: IMPROVING THE QUALITY OF INTELLIGENCE:
MANAGEMENT ISSUES AND STRATEGIES
(6.1).
(6.2).
(6.3).
(6.4).
(6.5).
(6.6).
(6.7).
IMPERATIVES OF SYSTEMIC IMPROVEMENTS
DEFINING THE PROPER ROLE OF INTELLIGENCE IN THE
POLICY-MAKING PROCESS
OPTIMAL UTILISATION OF THE SYSTEM: EXPECTATIONS FROM
THE CONSUMERS OF INTELLIGENCE
RESOURCE MANAGEMENT: SETTING INTELLIGENCE PRIORITIES
SPECIAL EMPHASIS ON ANALYSIS AND EVALUATION
REQUISITE ORGANISATIONAL MODELS AND BEHAVIOUR
INTRODUCING ACCOUNTABILITY AND OVERSIGHT
References
Part III
“INTELLIGENCE AND TECHNOLOGY”
CHAPTER VII. TECHNICAL MEANS OF INTELLIGENCE COLLECTION:
A REVIEW
(7.1)
SPY PLANES FOR STRATEGIC INTELLIGENCE COLLECTION
(7.1.1.).
(7.1.2.).
(7.2).
(7.2.1.).
(7.2.2.).
(7.2.3.).
(7.3).
(7.3.1).
(7.4).
(7.5).
The U-2 story
Soaring higher with the SR-71 ‘Blackbird’
THE AWESOME REACH OF SPY SATELLITES
Landmarks in the development of spy satellites
Technological sophistication in spy satellites of the U.S.A.
Russian expertise in spy satellites
THE INDIAN ‘TES’ (TECHNOLOGY EXPERIMENTAL SATELLITE)
AND BEYOND
IRS-P5 (Cartosat)
PROBLEMS ASSOCIATED WITH PRIVATE SATELLITES
VULNERABILITY OF SATELLITES
(7.6).
(7.6.1).
(7.6.2).
(7.7).
(7.7.1).
(7.7.2).
(7.7.3).
(7.7.4).
(7.7.5).
(7.7.6).
(7.8).
(7.8.1).
(7.8.2).
(7.8.3).
(7.9).
(7.9.1).
(7.9.2).
(7.9.3).
(7.9.4).
(7.10).
TACTICAL AND BATTLEFIELD INTELLIGENCE COLLECTION
SYSTEMS
State of the art systems
Indian systems
FERRETING SECRETS ON GROUND: MEASURES AND
COUNTERMEASURES FOR TECHNICAL SURVEILLANCE
Various types of bugs and wiretaps
(a).
Supplying power to microphones
(b).
Different categories of bugs
Capabilities and limitations of bugs
The Indian scene
Wiretapping
(a).
Different categories of wiretaps
(b).
The Indian position
Technical surveillance countermeasures (TSCM)
(a).
Warning signs of technical surveillance
(b).
TSCM ‘sweeps’
Covert visual observation through spy cameras
VAN ECK MONITORING AND ‘TEMPEST’
Van Eck monitoring technology
TEMPEST technology
Indian vulnerabilities
DESIRABILITY OF HAVING AN AGENCY ON THE PATTERN OF THE
N. S. A. (NATIONAL SECURITY AGENCY)
Importance attached to the NSA
Missions of the NSA
Wartime role of the NSA
Lessons to be learnt by India
CHEMICAL AND BIOLOGICAL RESEARCH IN SUPPORT OF
INTELLIGENCE OPERATIONS
References
CHAPTER VII. FRONTIER DISCIPLINES OF TECHNICAL INTELLIGENCE
(8.1).
(8.1.1).
(8.1.2).
(8.1.3).
(8.1.4).
(8.2).
(8.2.1).
(8.2.2).
(8.2.3).
(8.3).
SIGINT (SIGNALS INTELLIGENCE)
Different categories of SIGrNT
Some success stories and the importance of SIGINT
Technology of SIGINT satellites
(a).
Problems in antenna design and deployment
(b).
Orbit considerations
The long road before us: What India should do for SIGINT
MASINT (MEASUREMENT AND SIGNAT INTELLIGENCE)
Components of MASINT
Capabilities of MASINT
Examples of MASINT
IMINT (IMAGERY INTELLIGENCE)
(8.3.1).
(8.3.2).
(8.4).
(8.4.1).
(8.4.2).
(8.4.3).
Various types of IMINT
Tactical IMINT operations
(a). Various formats used in PHOTINT
INTELLIGENCE AND ELECTRONIC WARFARE SYSTEM
Electronic support measures
Electronic countermeasures
(a). Jamming
(b). Electronic deception
Electronic counter-countermeasures References
CHAPTER IX: INTELLIGENCE WARFARE IN CYBERSPACE
(9.1).
A BRIEF HISTORY OF THE NET
(9.2).
MANIPULATIVE EXPLOITATION OF THE NET
(9.2.1).
Mischievous, criminal and other disruptive activities on the Net
(9.3).
WARLIKE OFFENSIVE OPERATIONS THROUGH THE INTERNET
(9.3.1).
The extent of damage than can be inflicted by such operations
(9.4).
BASIC DEFENSIVE MEASURES IN CYBER WAR
(9.4.1).
Fundamental principles of information protection
(9.4.2).
Common sources of threat and risk management
(9.4.3).
A typical information protection programme
(9.5).
ADVANCED CYBER SECURITY DEVICES
(9.5.1).
The question of encryption
(9.5.2).
The matter of firewalls, etc
(9.5.3).
Tracing the attacker
(9.6).
INDIAN PROSPECTS IN THE BATTLEFIELDS OF CYBER SPACE
Notes
References
Part IV
“VIP SECURITY”
CHAPTER X: ADVANCED CONCEPTS IN SECURITY MANAGEMENT: VIP
SECURITY, SUICIDE TERRORISM, AND MOVEMENT
SECURITY
(10.1).
(10.1.1).
(10.1.2).
(10.1.3).
(10.1.4).
(10.1.5).
(10.1.6).
A SCIENTIFIC APPROACH TO VIP SECURITY
Tactical concerns of VIP security
Importance of intelligence in security management
(a).
Protective research
Individual protective measures
(a).
Overcoming routine and introducing the element of surprise
(b).
Adopting a security mind-set and to prepare for the unexpected
Enhanced residential security measures
Protection in the working environment
VIP motorcades: Devising a unique and functionally the most efficient plan
(a). The prevailing “in tandem” plan
(b). Frailties of the prevailing system
(c).
Introducing the “elongated diamond” formation
(d).
The “elongated diamond” formation in operation
(e).
Selecting cars and motorcycles for VIP motorcades
(f).
Weaponry to be carried in the VIP motocade
(10.1.7).
Close protection
(10.1.8).
Protective driving
(10.1.9). Selecting the best handgun for VIP security
(10.1.10). Vulnerabilities of the present system of VIP security to innovative methods
of attack
(10.2).
SUICIDE TERRORISM: THE DESPERATE OPTION
(10.2.1).
Suicide operations: Historical background and definitional aspects
(10.2.2). The expedience of using suicide terrorism
(10.2.3). The technology of suicide terrorism and possible counters
(10.3).
THE VEXATIOUS PROBLEM OF MOVEMENT SECURITY
(10.3.1). Classification of roads
(10.3.2).
Providing protection en route
(10.3.3).
Convoy preparation and discipline
(10.3.4).
Action on contact References
Part-V
“PHYSICAL SECURITY”
CHAPTER XI . SUPERIOR TECHNIQUES IN PHYSICAL SECURITY OF
VITAL INSTALLATIONS
(11.1).
THE CONCEPT OF INTEGRATED PROTECTIVE SYSTEMS
11.1.1).
Design approach
(11.2).
DESIGN STRATEGIES FOR DEFENDING VITAL ASSETS AGAINST
VARIOUS TYPES OF ATTACKS
(11.2.1). Vehicle bombs
(11.2.2). Others types of bombings
(11.2.3). Attacks using stand-off weapons
(11.2.4). Small arms and grenades
(11.2.5). Forced-entry tactic
(11.2.6). Covert-entry and insider-compromise tactics
(11.2.7). Airborne or waterborne contamination
(11.3).
INNOVATIVE TECHNOLOGIES AND PROCEDURES IN ACCESS
CONTROL, PERIMETER SECURITY AND RELATED MATTERS
(11.3.1).
Access control
(11.3.2). Designating and establishing restricted areas
(11.3.3). Movement and control of personnel in restricted areas
(11.3.4). Security controls of packages, personal property, and vehicles
(11.3.5). Personnel screening and identification systems
(a).
Multiple card exchange system
(b).
Mechanised/automated systems and biometric devices
(11.3.6).
Protective barriers
(a).
Some sophisticated barriers
(b).
Security towers
(c).
Perimeter roads and clear zones
(11.3.7)
Security lighting
(11.3.8). Security forces
(11.4)
PROTECTION OF SENSITIVE POINTS AGAINST TERRORIST
ATTACKS IN INSURGENCY-AFFECTED AREAS
(11.5)
A REVIEW OF ELECTRONIC SECURITY’ SYSTEMS AND THEIR
ROLE IN BORDER MANAGEMENT
(11.5.1.). Interior intrusion detection systems
(a).
Boundary-penetration sensors
(b).
Volumetric motion sensors
(c).
Point sensors
(11.5.2.). Exterior intrusion detection systems
(a).
Fence sensors
(b).
Invisible perimeter sensors
(11.5.3.). Scientific border management
(11.6.).
SPECIAL PROBLEMS ASSOCIATED WITH VIP STRUCTURES
References
CHAPTER XII. THE CRITICAL FIELDS OF NUCLEAR SECURITY AND
AVIATION SECURITY
(12.1).
SECURITY ISSUES CONCERNING NUCLEAR FACILITIES
(12.1.1). Physical security of labs, plants and materials
(12.1.2). Screening and monitoring of personnel
(12.1.3). Protection of classified information
(12.1.4). Accounting for nuclear material
(12.1.5). Foreign visitors
(12.2).
RISKS FACED BY NUCLEAR WEAPONS STATES AND THOSE
POSSESSING NUCLEAR FACILITIES
(12.2.1).
Theft of nuclear material
(12.2.2). Sale/theft of nuclear weapons
(12.3).
THE SPECTRE OF NUCLEAR TERRORISM
(12.3.1).
Attacks using heavy vehicles laden with thousands of pounds of high
explosives
(12.3.2). Attacks using large aircrafts
(12.3.3). Can terrorists make nuclear weapons?
(12.3.4). Radiation dispersal devices or the “dirty bombs”
(12.4).
STRENGTHENING AVIATION SECURITY
(12.4.1). Pre-screening of passengers
(12.4.2). Airport security management
(a).
Advanced security systems for passengers and hand baggage
(b).
Enhanced security for cargo and hold baggage
(c).
Plugging loopholes in security procedures and devising more
stringent ones
(12.4.3).
(12.4.4).
Anti-hijacking measures
Security of the flight References
EPILOGUE
APPENDIX A: SECURITY AGAINST NUCLEAR, BIOLOGICAL, AND
CHEMICAL (NBC) STRIKES
(A.1).
(A.2).
(A.2.1).
(A.2.2).
(A.3).
PROTECTION FROM NUCLEAR STRIKES
DEFENCE AGAINST BIOLOGICAL WARFARE
Difficulties involved in the use of biological weapons by terrorists
Protective measures
COPING WITH CHEMICAL WEAPONS
References
APPENDIX B: SOME IMPORTANT INTELLIGENCE AGENCIES OF THE
WORLD
(B.1).
SECRET INTELLIGENCE SERVICE MI6
(B.2).
SECURITY SERVICE MI5
(B.3).
FOREIGN INTELLIGENCE SERVICE SLUZHBA VNESHNEY
RAZVEDKI (SVR)
(B.4).
MOSSAD—THE INSTITUTE FOR INTELLIGENCE AND SPECIAL
TASKS (HA-MOSSAD LE-MODHNULE-TAFKIDIM MEYUHADIM)
(B.5).
SHIN BET-GENERAL SECURITY SERVICE—SHERUT HA-BITACHON
HA-KLALI
(B.6).
MINISTRY OF STATE SECURITY (MSS) GUOJIA ANQUAN BU
(GUOANBU)
References
APPENDIX C: OPERATIONS SECURITY (OPSEC)
References
APPENDIX D: DISINFORMATION
(D.I).
THEORY AND PRACTICE
(D.2).
AMERICAN DISINFORMATION: A CASE STUDY
References
APPENDIX E: PSYCHOLOGICAL OPERATIONS (PSYOPS)
References
APPENDIX F: ECONOMIC INTELLIGENCE
References
Download