Table of ContentsTop Secret

FOREWORD

ACKNOWLEDGMENTS

TRANSPORTATION SECURITY: AN INTRODUCTION

PART I – DEFINING THE IMPORTANT ROLE, WORKINGS AND LIMITATIONS OF INTELLIGENCE

CHAPTER 1 – UNDERSTANDING THE ROLE OF INTELLIGENCE

THE FOUR PILLARS OF INTELLIGENCE

WORKINGS OF AN INTELLIGENCE SERVICE
A – Intelligence and counter-intelligence functions
B – Counter-terrorism functions & operations
C – Training, technical scientific and logistical support
D – Analysis and assessment

CHAPTER 2 – INTELLIGENCE ANALYSIS, ASSESSMENT AND INTERPRETATION

CHALLENGES IN ANALYSIS AND ASSESSMENT
– American vs. British intelligence culture
– Myths reinforcing distance
– Interaction between intelligence officers, collectors and analysts
– Countering the threat by detecting and identifying trends and patterns
– Improving intelligence analysis, optimizing its interpretation, and increasing its impact
– Enhancing analytic expertise by enlisting expert support
– Capturing institutional memory

CHAPTER 3 – CULTURAL BIAS AND THE SECURITY INTELLIGENCE GAP

– Cultural hazards associated with intelligence
– The blind fighting the blind and the rest of humanity pays a hefty price
– Intelligence means different things in different cultures
– Avoiding cultural bias

LEADERSHIP IN INTELLIGENCE
– The security intelligence gap
– How to blind yourself and confuse the cards
– Further self-blinding
– Democracy challenged

CHAPTER 4 – THE THREAT OF TERRORISM

PRIORITIZING COUNTER-TERRORISM & COUNTER-PIRACY
– Defining the threat environment
– Investigating terrorism
– Understanding the nature of the adversaries

WHAT ARE THE CHALLENGES FACING US?
– Disentangling good governance from the hold of blind religion
– Western support to corrupt, unrepresentative oppressive regimes
– Home-grown terrorism and how to stop it

CHAPTER 5 – THE QUEST FOR DECISIVE ACTION

– Misguided alliances
– Partnering between intelligence and foreign policy
– Cultural and operational differences between intelligence and law enforcement
– Reinstating quality into the intelligence service

PART II – APPLYING INTELLIGENCE TO AVIATION & MARITIME SECURITYCrypto Phone

CHAPTER 6 – AVIATION & MARITIME SECURITY INTELLIGENCE

Introduction: The aviation and maritime security environments

SOURCES OF THREAT TO CIVIL AVIATION
– Direct threats
– Threat-transfer resulting from airline code-sharing arrangements
– Threat related to bilateral agreements
– Transferred threats
– The aviation industry fights back

SOURCES OF THREAT TO THE MARITIME INDUSTRY
– Threats to ships
– Threats to ports and port facilities
– Threats to international straits and waterways

THE CASE OF SOMALI PIRACY ALONG THE HORN OF AFRICA AND THE GULF OF ADEN
– The profit-making business of Somali pirates
– Somali pirate attacks hit record level
– The maritime industry reacts
– Stopping Somali piracy
– The maritime industry fights back
– What should have been done from day one

OVERLOOKED THREATS
– Narcotics smuggling: A serious threat that is rarely considered by intelligence agencies
– The potential threat that is never considered by intelligence agencies

CHAPTER 7 – ORGANIZATION AND MANAGEMENT OF THE TRANSPORTATION
SECURITY AND INTELLIGENCE FUNCTION

– Learning from the experience of others
– Management of transportation security intelligence
– Security and intelligence functions of the Transportation Security Directorate
– Managing intelligence: The view from the Department of Transport side
– Transportation security and intelligence: A two-way street
– Balancing between national security, operational efficiency and commercial viability
– Collection and coordination of intelligence about threats to transportation security
– The applicability of the Israeli modus operandi

CHAPTER 8 – MANAGING THREAT AND RISK ASSESSMENTS

– Production of joint Threat Assessments
– National Threat Assessment centres
– The Threat Assessment process
– Risk Management in an aviation or maritime environment
– Managing risk assessments
– Key principles of Risk Management
– Threat Assessment implementation, compliance and reporting methodology
– A two-way threat and risk intelligence cycle
– Communicating imminent or actual threats to public safety/security
– Managing threat information communications

CHAPTER 9 – KEEPING A HANDLE ON SECURITY ON AN ONGOING BASIS

– Introduction
– Building law enforcement and security partnerships
– Fusion Centres overview
– Operational capabilities of Fusion Centres
– Addressing the security needs of the transportation sector

THE ROLE AND OBJECTIVES OF PERMANENT JOINT REGIONAL TRANSPORTATION
SECURITY COMMITTEES

– Outreach to the industry: Is it working?
– Attempt by Abdulmuttalab to destroy Northwest Airlines Flight
– Streamlining the security intelligence function within the Department of Transport
– Workings of Permanent Joint Regional Transportation Security Committee
– Committee organization, membership and benefits
– Proposed composition of the Regional Aviation Security Sub-Committee
– Proposed composition of the Regional Maritime Security Sub-Committee
– Importance of the Regional Security Director
– Role of the committees in keeping a handle on security on an ongoing basis
– Why are the Regional Security Committees conducive to better security?

CHAPTER 10 – CLOSING REMARKSShip Cockpit

PREPAREDNESS AND INTELLIGENCE SHARING

WHO STANDS TO BENEFIT?
A – Internally within the Department of Transport
B – Airlines, airports and the maritime industry stakeholders
C – The intelligence and law enforcement community

APPENDICES

APPENDIX 1 – WHY RELIGION?
– You cannot run away from history, it will always catch up with you!
– When religion is hijacked by politics

APPENDIX 2 – JUSTIFYING SUICIDE ATTACKS: THE WORLD ACCORDING TO EXTREMISTS
– From an ideological perspective
– The logic behind suicide attacks
– From a political and strategic perspective
– The critical path to extremism
– Al-Qaeda’s reach
– Why is it that Muslims, who do not agree with the extremist rhetoric, do not raise their voices in
opposition to acts of terrorism perpetrated in their name?

APPENDIX 3 – A DIFFERENT APPROACH TO SOLVING THE PALESTINE-ISRAEL QUESTION
– Preamble
– Can there be a solution to the Israeli-Palestinian standoff?
– Seven steps to peace:
Step 1- Cessation of hostilities
Step 2- Border security
Step 3- Leadership change
Step 4- The separation wall and movement of populations
Step 5- Reconnecting the West Bank and Gaza to the rest of the region
Step 6- The future of Palestinian refugees
Step 7- The future of Palestinian and Jewish populations on both sides of the dividing line

– Will it work?

APPENDIX 4 – THE CASE OF IRAQ: AN OUTLOOK TO THE FUTURE
– Oil, Iraq, Kurds, Turks, Iranians, and everybody else
– The backdrop
– Northern Iraq forecast & the bottom line

APPENDIX 5 – THE AFGHANISTAN SUPER CHALLENGE
– Another approach? The Afghanistan-Arabian sea highway

APPENDIX 6 – THE ORIGINS OF PIRACY AROUND THE SOMALI COAST
– How the Gulf of Aden pirates operate
– Digging deeper into the Somali piracy crisis
– Facing an increasingly sophisticated and technology-assisted piracy industry

SELECT BIBLIOGRAPHY

Suez Bridge Ship

© H. Eltaher – Suez Canal