Skip Navigation LinksASIS International / Education & Events / Global Events / 2014 Asia-Pacific Security Forum & Exhibition / Program and Events / Spy Versus Spy: How Terrorists Collect and Use Intelligence

Spy Versus Spy: How Terrorists Collect and Use Intelligence

Tuesday, 9 December
Breakout 2

Terrorist groups routinely collect Intelligence using similar methods to those employed by Law Enforcement, Intelligence and Security agencies. The collected Intelligence is used by terrorist groups for their attack planning, ensuring a higher degree of mission success, resulting in greater casualties and generating wider publicity for their cause. This presentation begins with an overview of the Intelligence cycle, then using a case study, moves on to provide delegates with an understanding of some of the techniques and methods used by terrorist groups to collect, analyse and use Intelligence, and to highlight some of their capabilities.

Presented by: Paul Burke, National Security Leader, Middle East & Africa, IBM Middle East, UAE

Paul Burke is an Arabic-speaking professional with over 27 years’ experience in strategic intelligence management. Currently IBM’s National Security Leader for Middle East & Africa, he was previously employed as the UK National Intelligence Adviser in Baghdad (2004-2006) and in Kabul (2007–2009). In Iraq, he worked in counter-terrorism and in Afghanistan he mentored the Intelligence Division of the Counter-Narcotics Police of Afghanistan (CNPA). His work has covered all aspects of Intelligence at strategic, operational and tactical levels. A Doctoral candidate, he will graduate with a PhD in Policing and Security in 2014, with his Doctoral thesis examining "A Review of The Intelligence Cycle and its Effectiveness in Counter-Terrorism since 2003". He holds an MA in Intelligence and Security Studies. Paul is the author of "Open Waters, Hidden Dangers: The Terrorist Threat to the Maritime Security of the UAE”, published by the Emirates Center for Strategic Studies and Research (ECSSR).