Table of Contents
FOREWORD
ACKNOWLEDGMENTS
TRANSPORTATION SECURITY: AN INTRODUCTION
PART I – DEFINING THE IMPORTANT ROLE, WORKINGS AND LIMITATIONS OF INTELLIGENCE
CHAPTER 1 – UNDERSTANDING THE ROLE OF INTELLIGENCE
THE FOUR PILLARS OF INTELLIGENCE
WORKINGS OF AN INTELLIGENCE SERVICE
A – Intelligence and counter-intelligence functions
B – Counter-terrorism functions & operations
C – Training, technical scientific and logistical support
D – Analysis and assessment
CHAPTER 2 – INTELLIGENCE ANALYSIS, ASSESSMENT AND INTERPRETATION
CHALLENGES IN ANALYSIS AND ASSESSMENT
– American vs. British intelligence culture
– Myths reinforcing distance
– Interaction between intelligence officers, collectors and analysts
– Countering the threat by detecting and identifying trends and patterns
– Improving intelligence analysis, optimizing its interpretation, and increasing its impact
– Enhancing analytic expertise by enlisting expert support
– Capturing institutional memory
CHAPTER 3 – CULTURAL BIAS AND THE SECURITY INTELLIGENCE GAP
– Cultural hazards associated with intelligence
– The blind fighting the blind and the rest of humanity pays a hefty price
– Intelligence means different things in different cultures
– Avoiding cultural bias
LEADERSHIP IN INTELLIGENCE
– The security intelligence gap
– How to blind yourself and confuse the cards
– Further self-blinding
– Democracy challenged
CHAPTER 4 – THE THREAT OF TERRORISM
PRIORITIZING COUNTER-TERRORISM & COUNTER-PIRACY
– Defining the threat environment
– Investigating terrorism
– Understanding the nature of the adversaries
WHAT ARE THE CHALLENGES FACING US?
– Disentangling good governance from the hold of blind religion
– Western support to corrupt, unrepresentative oppressive regimes
– Home-grown terrorism and how to stop it
CHAPTER 5 – THE QUEST FOR DECISIVE ACTION
– Misguided alliances
– Partnering between intelligence and foreign policy
– Cultural and operational differences between intelligence and law enforcement
– Reinstating quality into the intelligence service
PART II – APPLYING INTELLIGENCE TO AVIATION & MARITIME SECURITY
CHAPTER 6 – AVIATION & MARITIME SECURITY INTELLIGENCE
Introduction: The aviation and maritime security environments
SOURCES OF THREAT TO CIVIL AVIATION
– Direct threats
– Threat-transfer resulting from airline code-sharing arrangements
– Threat related to bilateral agreements
– Transferred threats
– The aviation industry fights back
SOURCES OF THREAT TO THE MARITIME INDUSTRY
– Threats to ships
– Threats to ports and port facilities
– Threats to international straits and waterways
THE CASE OF SOMALI PIRACY ALONG THE HORN OF AFRICA AND THE GULF OF ADEN
– The profit-making business of Somali pirates
– Somali pirate attacks hit record level
– The maritime industry reacts
– Stopping Somali piracy
– The maritime industry fights back
– What should have been done from day one
OVERLOOKED THREATS
– Narcotics smuggling: A serious threat that is rarely considered by intelligence agencies
– The potential threat that is never considered by intelligence agencies
CHAPTER 7 – ORGANIZATION AND MANAGEMENT OF THE TRANSPORTATION
SECURITY AND INTELLIGENCE FUNCTION
– Learning from the experience of others
– Management of transportation security intelligence
– Security and intelligence functions of the Transportation Security Directorate
– Managing intelligence: The view from the Department of Transport side
– Transportation security and intelligence: A two-way street
– Balancing between national security, operational efficiency and commercial viability
– Collection and coordination of intelligence about threats to transportation security
– The applicability of the Israeli modus operandi
CHAPTER 8 – MANAGING THREAT AND RISK ASSESSMENTS
– Production of joint Threat Assessments
– National Threat Assessment centres
– The Threat Assessment process
– Risk Management in an aviation or maritime environment
– Managing risk assessments
– Key principles of Risk Management
– Threat Assessment implementation, compliance and reporting methodology
– A two-way threat and risk intelligence cycle
– Communicating imminent or actual threats to public safety/security
– Managing threat information communications
CHAPTER 9 – KEEPING A HANDLE ON SECURITY ON AN ONGOING BASIS
– Introduction
– Building law enforcement and security partnerships
– Fusion Centres overview
– Operational capabilities of Fusion Centres
– Addressing the security needs of the transportation sector
THE ROLE AND OBJECTIVES OF PERMANENT JOINT REGIONAL TRANSPORTATION
SECURITY COMMITTEES
– Outreach to the industry: Is it working?
– Attempt by Abdulmuttalab to destroy Northwest Airlines Flight
– Streamlining the security intelligence function within the Department of Transport
– Workings of Permanent Joint Regional Transportation Security Committee
– Committee organization, membership and benefits
– Proposed composition of the Regional Aviation Security Sub-Committee
– Proposed composition of the Regional Maritime Security Sub-Committee
– Importance of the Regional Security Director
– Role of the committees in keeping a handle on security on an ongoing basis
– Why are the Regional Security Committees conducive to better security?
CHAPTER 10 – CLOSING REMARKS
PREPAREDNESS AND INTELLIGENCE SHARING
WHO STANDS TO BENEFIT?
A – Internally within the Department of Transport
B – Airlines, airports and the maritime industry stakeholders
C – The intelligence and law enforcement community
APPENDICES
APPENDIX 1 – WHY RELIGION?
– You cannot run away from history, it will always catch up with you!
– When religion is hijacked by politics
APPENDIX 2 – JUSTIFYING SUICIDE ATTACKS: THE WORLD ACCORDING TO EXTREMISTS
– From an ideological perspective
– The logic behind suicide attacks
– From a political and strategic perspective
– The critical path to extremism
– Al-Qaeda’s reach
– Why is it that Muslims, who do not agree with the extremist rhetoric, do not raise their voices in
opposition to acts of terrorism perpetrated in their name?
APPENDIX 3 – A DIFFERENT APPROACH TO SOLVING THE PALESTINE-ISRAEL QUESTION
– Preamble
– Can there be a solution to the Israeli-Palestinian standoff?
– Seven steps to peace:
Step 1- Cessation of hostilities
Step 2- Border security
Step 3- Leadership change
Step 4- The separation wall and movement of populations
Step 5- Reconnecting the West Bank and Gaza to the rest of the region
Step 6- The future of Palestinian refugees
Step 7- The future of Palestinian and Jewish populations on both sides of the dividing line
– Will it work?
APPENDIX 4 – THE CASE OF IRAQ: AN OUTLOOK TO THE FUTURE
– Oil, Iraq, Kurds, Turks, Iranians, and everybody else
– The backdrop
– Northern Iraq forecast & the bottom line
APPENDIX 5 – THE AFGHANISTAN SUPER CHALLENGE
– Another approach? The Afghanistan-Arabian sea highway
APPENDIX 6 – THE ORIGINS OF PIRACY AROUND THE SOMALI COAST
– How the Gulf of Aden pirates operate
– Digging deeper into the Somali piracy crisis
– Facing an increasingly sophisticated and technology-assisted piracy industry
SELECT BIBLIOGRAPHY

© H. Eltaher – Suez Canal