Identifying and Defeating Infiltration Threats to the Homeland: German Sabotage in World War II, al-Qaeda, False Iraqi Freedom Lessons, China Threats, Attack Scenarios, Counterintelligence Shortfalls

Nonfiction, History, Military, World War II, Social & Cultural Studies, Political Science
Cover of the book Identifying and Defeating Infiltration Threats to the Homeland: German Sabotage in World War II, al-Qaeda, False Iraqi Freedom Lessons, China Threats, Attack Scenarios, Counterintelligence Shortfalls by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310628153
Publisher: Progressive Management Publication: April 5, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310628153
Publisher: Progressive Management
Publication: April 5, 2016
Imprint: Smashwords Edition
Language: English

Professionally converted for accurate flowing-text e-book format reproduction, this unique book explores the full spectrum of infiltration threats to the Homeland and examines the danger posed by foreign controlled or directed operatives who enter the United States for the purpose of conducting espionage, sabotage, assassination or terrorist attacks. Using historical examples, it demonstrates the likelihood enemy operatives could enter the United States undetected and conduct hostile acts.

Following this discussion, the paper proposes an analytical framework useful for examining the full range of infiltration threats posed by both state and non-state actors. This framework includes an adversary's presence in the United States and the ease at which their nationals can access US society, their ability and demonstrated intent to conduct aggressive and sophisticated intelligence operations within the United States, the collection priorities of their espionage operations, the special operations capabilities of their military and paramilitary forces, and the nature of their military doctrine and their focus on asymmetric operations. The applicability of this analytical framework is demonstrated via an examination of Chinese infiltration capabilities. This examination explores the likelihood China would have the ability and intent to conduct terrorism, assassinations, sabotage attacks and espionage operations within the United States in the event of military conflict.

This paper also discusses the probable US targets enemy sabotage operatives would strike. It discusses four primary target categories including: 1) Strikes against critical military and civilian transportation infrastructure and assets required to deploy military forces; 2) Assaults against key military installations designed to destroy critical weapons systems and command and control nodes; 3) Assassinations of senior political and military leaders; and 4) Attacks designed to impact US morale.

INTRODUCTION * LESSONS FROM HISTORY * German Sabotage Threats During World Wars I and II * Al Qaeda Strikes America * False Lessons from Operation IRAQI FREEDOM * EXAMINING ENEMY INFILTRATION AND SABOTAGE THREATS * Infiltration Methods * A Framework for Analyzing Foreign Infiltration Threats * ANALYZING THE INFILTRATION AND SABOTAGE THREATS POSED BY THE PEOPLE'S REPUBLIC OF CHINA * China's Presence in the United States * PRC Intelligence Operations in the United States * Chinese Intelligence Collection Priorities * PRC Special Operations Capabilities * PRC Military Doctrine * Rating the Infiltration Threat Posed by China * ATTACK SCENARIOS * Attack Methods * Attacks on the Defense Transportation System * Attacks against Key Military Facilities and Leaders * Attacks Designed to Impact Morale * CI'S ROLE IN IDENTIFYING AND NEUTRALIZING INFILTRATION THREATS * Current US Counterintelligence Structure * DOD Counterintelligence Resource Shortfalls * DOD CI Structural Weaknesses * Current Laws and Directives that Impact DOD CI and Investigative Activities * Issues of Trust and Credibility * RECOMMENDATIONS AND CONCLUSIONS * Moving Beyond Terrorism to a Focus on Full-Spectrum Infiltration Threats * Meeting the CI Challenges of 21st Century * Improving the Connection Between DOD CI and the War Fighting Role of the COCOMs * Conclusion. * BIBLIOGRAPHY

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Professionally converted for accurate flowing-text e-book format reproduction, this unique book explores the full spectrum of infiltration threats to the Homeland and examines the danger posed by foreign controlled or directed operatives who enter the United States for the purpose of conducting espionage, sabotage, assassination or terrorist attacks. Using historical examples, it demonstrates the likelihood enemy operatives could enter the United States undetected and conduct hostile acts.

Following this discussion, the paper proposes an analytical framework useful for examining the full range of infiltration threats posed by both state and non-state actors. This framework includes an adversary's presence in the United States and the ease at which their nationals can access US society, their ability and demonstrated intent to conduct aggressive and sophisticated intelligence operations within the United States, the collection priorities of their espionage operations, the special operations capabilities of their military and paramilitary forces, and the nature of their military doctrine and their focus on asymmetric operations. The applicability of this analytical framework is demonstrated via an examination of Chinese infiltration capabilities. This examination explores the likelihood China would have the ability and intent to conduct terrorism, assassinations, sabotage attacks and espionage operations within the United States in the event of military conflict.

This paper also discusses the probable US targets enemy sabotage operatives would strike. It discusses four primary target categories including: 1) Strikes against critical military and civilian transportation infrastructure and assets required to deploy military forces; 2) Assaults against key military installations designed to destroy critical weapons systems and command and control nodes; 3) Assassinations of senior political and military leaders; and 4) Attacks designed to impact US morale.

INTRODUCTION * LESSONS FROM HISTORY * German Sabotage Threats During World Wars I and II * Al Qaeda Strikes America * False Lessons from Operation IRAQI FREEDOM * EXAMINING ENEMY INFILTRATION AND SABOTAGE THREATS * Infiltration Methods * A Framework for Analyzing Foreign Infiltration Threats * ANALYZING THE INFILTRATION AND SABOTAGE THREATS POSED BY THE PEOPLE'S REPUBLIC OF CHINA * China's Presence in the United States * PRC Intelligence Operations in the United States * Chinese Intelligence Collection Priorities * PRC Special Operations Capabilities * PRC Military Doctrine * Rating the Infiltration Threat Posed by China * ATTACK SCENARIOS * Attack Methods * Attacks on the Defense Transportation System * Attacks against Key Military Facilities and Leaders * Attacks Designed to Impact Morale * CI'S ROLE IN IDENTIFYING AND NEUTRALIZING INFILTRATION THREATS * Current US Counterintelligence Structure * DOD Counterintelligence Resource Shortfalls * DOD CI Structural Weaknesses * Current Laws and Directives that Impact DOD CI and Investigative Activities * Issues of Trust and Credibility * RECOMMENDATIONS AND CONCLUSIONS * Moving Beyond Terrorism to a Focus on Full-Spectrum Infiltration Threats * Meeting the CI Challenges of 21st Century * Improving the Connection Between DOD CI and the War Fighting Role of the COCOMs * Conclusion. * BIBLIOGRAPHY

More books from Progressive Management

Cover of the book Policy Analysis in National Security Affairs: New Methods for a New Era, Weapons, Strategies, Nuclear and Conventional Roles, Alliance Leadership, Stability in a Dangerous World, Promoting Democracy by Progressive Management
Cover of the book Introduction to the United States Air Force: Extensive History of the Aircraft, Missiles, Satellites, Leaders, Heroes, Battles, Fighter Aces of the USAF from World War I to the 21st Century by Progressive Management
Cover of the book Oman in Perspective: Orientation Guide: Geography, History, Economy, Security, Muscat, Salalah, Nizwa, Yarubi Imamate, Sultan Qaboos bin Said, Baluchi, Lawatiyya, Khojas, Rustaq, Slave Trade by Progressive Management
Cover of the book 2014 Wildland Fire Incident Management Field Guide PMS 210 (Formerly Fireline Handbook PMS 410) - Firefighting Safety, Initial and Extended Attack, Pumps, Foam, Fireline Explosives, Tankers by Progressive Management
Cover of the book Protection of Shipping: A Forgotten Mission with Many New Challenges - Admiral Alfred Thayer Mahan, Merchant Shipping, Naval Cooperation and Guidance for Shipping (NCAGS), Historical Perspective by Progressive Management
Cover of the book Societal Impact of Spaceflight: Apollo, Shuttle, China, Russia, Reconnaissance, GPS, Earth Satellites, JPL, Food Standards, Spacefaring Species (NASA SP-2007-4801) by Progressive Management
Cover of the book The History of the U.S. Army Corps of Engineers: From the Revolutionary War to the Space Race, West Point, Flood Control, Hydropower, Combat Operations, Panama Canal, World War I and II, Apollo by Progressive Management
Cover of the book Cold War Infrastructure for Air Defense: The Fighter and Command Missions - SAC, ADC, ANG, TAC, SAGE, Alert Hangars, Simulator, Aircraft Shelters, Air Force Bases from Barksdale to Whiteman by Progressive Management
Cover of the book 2014: The Future of American Airpower - America's Air Force: a Call to the Future, Agile USAF, Naval Aviation Vision 2014-2025, Air-Sea Battle, ISR, UCLASS, X-47B, F-35, 21st Century Deterrence by Progressive Management
Cover of the book Memories of the Golden Age of American Space Flight (Mercury, Gemini, Apollo, Skylab) - Oral Histories of Managers, Engineers, and Workers (Set 1) - Including Charles Berry, Max Faget by Progressive Management
Cover of the book NASA's Efforts to Manage Health and Human Performance Risks for Space Exploration: Human Mars Missions, Astronaut Health Care, Radiation, Vision Impairment and Intracranial Pressure, Nutrition by Progressive Management
Cover of the book Trinity: The World's First Atomic Explosion - History of the Atomic Bomb Test and the New Mexico Test Site, Rehearsal Shot, Report on Nuclear Energy Released, Damage Effects, Observations by Progressive Management
Cover of the book The Military Strategies of Spruance and Halsey: World War II Battle of Midway, Battle for Leyte Gulf, Philippines, Sibuyan Sea, Surigao Strait, Cape Engano, Samar, Military Strategy Comparisons by Progressive Management
Cover of the book U.S. Marines in the Global War on Terrorism: U.S. Marines in Iraq, 2003: Anthology and Annotated Bibliography - UAVs, Humint Exploitation Teams (HETs), Media Embeds by Progressive Management
Cover of the book Violating Reality: The Lavelle Affair, Nixon, and Parsing the Truth - Dedicated Air Force Leader Treated Unjustly and Abandoned by Government, New Evidence about Vietnam War Air Strike Authorization by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy