This book details the intellectual and bureaucratic challenges that intelligence analysts disrupting terrorist and insurgent finances encounter. Each chapter uses analytic methods via a case study drawn from the real experiences of intelligence analysts deployed to Iraq and/or Afghanistan to support live military operations.
This edited volume describes various analytic methods used by intelligence analysts supporting military operations in Iraq and Afghanistan as members of the Iraq and Afghan Threat Finance Cells-interagency intelligence teams tasked to disrupt terrorist and insurgent funding. All contributors have deployed to Iraq and/or Afghanistan and detail both the bureaucratic and intellectual challenges in understanding terrorist and insurgent finance networks and then designing operations to attack such networks via conventional military operations, Special Forces kill/capture targeting operations, and non-kinetic operations such as asset freezing or diplomacy. The analytic methods described here leverage both quantitative and qualitative methods, but in a language and style accessible to those without a quantitative background. All methods are demonstrated via actual case studies (approved for release by the U.S. government) drawn from the analysts' distinct experiences while deployed. This book will be of interest to current or aspiring intelligence analysts, students of security studies, anti-money laundering specialists in the private sector, and more generally to those interested in understanding how intelligence analysis feeds into live operations during wartime at a very tactical level.
David M. Blum is an operations research analyst for the U.S. Air Force serving as a civilian member of the Air Staff. He received his PhD in management science and engineering from Stanford University.
J. Edward Conway is a senior manager for a multinational advisory firm, where he focuses on corporate intelligence. A former analyst for the U.S. Department of Defense, he received his PhD in international relations from the University of St Andrews in Scotland.
Foreword David D. McKiernan, General (Retired), U.S. Army Chapter One: Introduction: The Threat Finance Cell J. Edward Conway Chapter Two: Intelligence Analysis: An Operator's Perspective Colonel Clayton O. Sheffield, U.S. Army Chapter Three: Where Counterinsurgency Meets Counter Threat Finance Brian A. Gordon Chapter Four: From People to Processes: Collecting Intelligence That Matters David M. Blum & Brian A. Gordon Chapter Five: Al-Qa'ida in Iraq's Financial Ledgers Benjamin Bahney and Howard J. Shatz Chapter Six: Cost Accounting: Auditing the Taliban in Helmand Province, Afghanistan Brian A. Gordon and J. Edward Conway Chapter Seven: Using Financial Data to Analyze Terrorist Motivations: The Case of Al-Qa'ida in Iraq's Payrolls Benjamin Bahney and Howard J. Shatz Chapter Eight: Social Network Analysis: Understanding Threat Financial Networks David M. Blum and Brian A. Gordon Chapter Nine: Scenario Planning: The "Master" of Spin Boldak and The Chaman Border Crossing David Blum and J. Edward Conway Chapter Ten: Decision Analysis: Rank-Ordering Members of the Insurgent Group As'aib Ahl al-Haqq J. Edward Conway Chapter Eleven: Designing Courses of Action: From Problem-setting to Problem-solving J. Edward Conway Chapter Twelve: Conclusion J. Edward Conway and David Blum
In one of the few books on the subject, Counterterrorism and Threat Finance Analysis during Wartime, J. Edward Conway argues that it is a mistake to think that the imperative to deploy civilian analysts to combat zones is fast diminishing. . . .[This book] is an excellent addition to the already existing literature on the subject. The hands-on experience and knowledge of the editors makes it a must-read for all experts and students of terrorism-related subjects. It should be a required reading for all counter threat finance analysts. The Washington BookReview The threat finance discipline required a consolidated primer for those new to the field, and now it exists. This book is engaging and the contributing authors' experiences as forward deployed threat finance analysts, clearly helped them develop and refine the methodologies outlined in these chapters. The next generation of threat finance analysts won't have to learn through trial and error, but now have proven techniques to accelerate their effectiveness in supporting our country's efforts to identify and disrupt the financial networks that are the lifeblood of every terrorist organization. Moreover, the methodologies in this book can be
dual use weapons' in the fight to defend the country and protect the financial system. They are not only relevant to the military and intelligence communities, but can be applied to the field of private sector compliance as well. -- Kirk E. Meyer, Founding Director, Afghanistan Threat Finance Cell This much-needed volume captures and clearly explains the lessons learned from a decade's worth of threat finance activity. Each of the authors were, or still are, battlefield practitioners in this discipline, and now have made an academic contribution to match their achievements in the field. This work lays the intellectual foundations for tactics, techniques, policies, and doctrine for future threat finance activities-it is a must read for anyone in the business. -- Steven Kiser, former DoD co-lead, Iraq Threat Finance Cell Much has been written about thewar of ideas' in counterterrorism, but this book considers the problem as a war of resources. By focusing on threat finance analysis, it provides an important primer for intelligence scholars and practitioners. Detailed case studies also fill an important gap for current strategists and future historians of the wars in Iraq and Afghanistan. -- Joshua Rovner, Director, Security and Strategy Program, Southern Methodist University
Shop Now. Enjoy Now. Pay Later.
Pay in four simple instalments, available instantly at checkout.
All you need is:
1) A New Zealand credit or debit card; 2) To be at least 18 years of age; 3) To live in New Zealand
To see Afterpay's complete terms, visit https://www.afterpay.com/en-NZ/terms