Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This edited volume describes various analytic methods used by intelligence analysts supporting military operations in Iraq and Afghanistan as members of the Iraq and Afghan Threat Finance Cells-interagency intelligence teams tasked to disrupt terrorist and insurgent funding. All contributors have deployed to Iraq and/or Afghanistan and detail both the bureaucratic and intellectual challenges in understanding terrorist and insurgent finance networks and then designing operations to attack such networks via conventional military operations, Special Forces kill/capture targeting operations, and…mehr
This edited volume describes various analytic methods used by intelligence analysts supporting military operations in Iraq and Afghanistan as members of the Iraq and Afghan Threat Finance Cells-interagency intelligence teams tasked to disrupt terrorist and insurgent funding. All contributors have deployed to Iraq and/or Afghanistan and detail both the bureaucratic and intellectual challenges in understanding terrorist and insurgent finance networks and then designing operations to attack such networks via conventional military operations, Special Forces kill/capture targeting operations, and non-kinetic operations such as asset freezing or diplomacy. The analytic methods described here leverage both quantitative and qualitative methods, but in a language and style accessible to those without a quantitative background. All methods are demonstrated via actual case studies (approved for release by the U.S. government) drawn from the analysts' distinct experiences while deployed. This book will be of interest to current or aspiring intelligence analysts, students of security studies, anti-money laundering specialists in the private sector, and more generally to those interested in understanding how intelligence analysis feeds into live operations during wartime at a very tactical level.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
David M. Blum is an operations research analyst for the U.S. Air Force serving as a civilian member of the Air Staff. He received his PhD in management science and engineering from Stanford University. J. Edward Conway is a senior manager for a multinational advisory firm, where he focuses on corporate intelligence. A former analyst for the U.S. Department of Defense, he received his PhD in international relations from the University of St Andrews in Scotland.
Inhaltsangabe
Foreword David D. McKiernan, General (Retired), U.S. Army Chapter One: Introduction: The Threat Finance Cell J. Edward Conway Chapter Two: Intelligence Analysis: An Operator's Perspective Colonel Clayton O. Sheffield, U.S. Army Chapter Three: Where Counterinsurgency Meets Counter Threat Finance Brian A. Gordon Chapter Four: From People to Processes: Collecting Intelligence That Matters David M. Blum & Brian A. Gordon Chapter Five: Al-Qa'ida in Iraq's Financial Ledgers Benjamin Bahney and Howard J. Shatz Chapter Six: Cost Accounting: Auditing the Taliban in Helmand Province, Afghanistan Brian A. Gordon and J. Edward Conway Chapter Seven: Using Financial Data to Analyze Terrorist Motivations: The Case of Al-Qa'ida in Iraq's Payrolls Benjamin Bahney and Howard J. Shatz Chapter Eight: Social Network Analysis: Understanding Threat Financial Networks David M. Blum and Brian A. Gordon Chapter Nine: Scenario Planning: The "Master" of Spin Boldak and The Chaman Border Crossing David Blum and J. Edward Conway Chapter Ten: Decision Analysis: Rank-Ordering Members of the Insurgent Group As'aib Ahl al-Haqq J. Edward Conway Chapter Eleven: Designing Courses of Action: From Problem-setting to Problem-solving J. Edward Conway Chapter Twelve: Conclusion J. Edward Conway and David Blum
Foreword David D. McKiernan, General (Retired), U.S. Army Chapter One: Introduction: The Threat Finance Cell J. Edward Conway Chapter Two: Intelligence Analysis: An Operator's Perspective Colonel Clayton O. Sheffield, U.S. Army Chapter Three: Where Counterinsurgency Meets Counter Threat Finance Brian A. Gordon Chapter Four: From People to Processes: Collecting Intelligence That Matters David M. Blum & Brian A. Gordon Chapter Five: Al-Qa'ida in Iraq's Financial Ledgers Benjamin Bahney and Howard J. Shatz Chapter Six: Cost Accounting: Auditing the Taliban in Helmand Province, Afghanistan Brian A. Gordon and J. Edward Conway Chapter Seven: Using Financial Data to Analyze Terrorist Motivations: The Case of Al-Qa'ida in Iraq's Payrolls Benjamin Bahney and Howard J. Shatz Chapter Eight: Social Network Analysis: Understanding Threat Financial Networks David M. Blum and Brian A. Gordon Chapter Nine: Scenario Planning: The "Master" of Spin Boldak and The Chaman Border Crossing David Blum and J. Edward Conway Chapter Ten: Decision Analysis: Rank-Ordering Members of the Insurgent Group As'aib Ahl al-Haqq J. Edward Conway Chapter Eleven: Designing Courses of Action: From Problem-setting to Problem-solving J. Edward Conway Chapter Twelve: Conclusion J. Edward Conway and David Blum
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826