Inside Information - Terrorist Use of Intelligence

Tuesday, February 17
Breakout 3

This presentation details some of the methods employed by terrorist groups to collect and use Intelligence in their attack planning. It also explains the Intelligence cycle model in detail.

Terrorist groups routinely collect Intelligence using similar methods to those employed by Law Enforcement, Intelligence and Security agencies. The collected Intelligence is used by terrorist groups for their attack planning, ensuring a higher degree of mission success, resulting in greater casualties and generating wider publicity for their cause. This presentation begins with an overview of the Intelligence cycle, then using a case study of a previous attack, moves on to provide delegates with an understanding of some of the techniques and methods used by such groups to collect, analyse and use Intelligence, and to highlight some of their capabilities.

Presented by: Paul Burke, National Security Leader, Middle East & Africa, IBM, United Arab Emirates

Paul Burke is an Arabic-speaking professional with over 27 years’ experience in strategic intelligence management. Currently IBM’s National Security Leader for Middle East & Africa, he was previously employed as the UK National Intelligence Adviser, in Baghdad (2004-2006) and in Kabul (2007–2009). In Iraq, he worked in counter-terrorism and in Afghanistan he mentored the Intelligence Division of the Counter-Narcotics Police of Afghanistan (CNPA). His work has covered all aspects of Intelligence at strategic, operational and tactical levels. A Doctoral candidate, he will graduate with a PhD in Policing and Security in 2014, with his Doctoral thesis examining "A Review of The Intelligence Cycle and its Effectiveness in Counter-Terrorism since 2003". He holds an MA in Intelligence and Security Studies. Paul is the author of "Open Waters, Hidden Dangers: The Terrorist Threat to Maritime Security".