A Quarterly, Peer Reviewed Online Journal

The Combating Threats Exchange staff are happy to bring you the February 2014 issue of CTX.

Asset Publisher
A Roundtable Conversation on Intelligence and Terrorism Part One: The Changing Nature of Terrorism

Has terrorism changed in any ways that have changed intelligence requirements, or the way in which the business of gathering information about terrorists and their organizations has to be done?

Read More

A Roundtable Conversation on Intelligence and Terrorism Part Two: Requirements and Roles and Missions

I would like to talk about roles and missions based on the various points that were brought up in the previous discussion on the changing character of terrorism. As a transition to that, could we talk a bit about intelligence requirements for terrorism, keeping in mind all the varieties that we have talked about? We talked about organizations, and dispersed organizations like al Qaeda, and individuals who suddenly pop up...

Read More

Tags, Tweets, and Tethers

On 29 January 2007, I opened my e-mail to discover that a colleague and friend, Jim Gray, was feared to be lost at sea. A noted computer scientist and Turing Award winner, Gray had failed to return the day before from a solo trip aboard his 40-foot sailboat Tenacious to the Farallon Islands, which lie about 27 miles off the coast of San Francisco. Over the next several days, I observed a massive search effort spring into action...

Read More

The Relevance of Technology in the Fight against India’s Maoist Insurgency

Large areas of central India have come under the cloud of a violent struggle between government forces and Maoist insurgents. The Maoists are active in at least nine out of the 28 states of India, and are trying to spread their influence into many more states.1 About 5,772 civilians and 2,065 members of the security forces were killed by the Maoists between 2001 and 2012. A majority of the civilians who have died in the violence were local tribal members, killed by insurgents who were enforcing Maoist hegemony over contested areas...

Read More

A Roundtable Conversation on Intelligence and Terrorism Part Three: Sharing Intelligence in Counterterrorism

I would like to suggest we not restrict our discussion to the issue of sharing intelligence between nations, but that we also consider the domestic experience represented by the participants in this meeting. In the United States, we have a lot of problems with information and intelligence sharing, both within the federal government and between the federal government and the states...

Read More

Preventing a Day of Terror: Lessons Learned from an Unsuccessful Terrorist Attack

One of the first and most successful cases of terrorism prevention in American history is also one of the least known. The case involved what the U.S. government later called a conspiracy "to levy a war of urban terrorism against the United States." A group of men plotted to bomb a number of targets in the New York City area, including the federal building at 26 Federal Plaza in Manhattan, which housed the New York headquarters of the Federal Bureau of Investigation (FBI); the United Nations (UN) Headquarters building...

Read More

CTAP Interview: Peter Berg, Director of Lone Survivor

This interview is taken from the collection of the Combating Terrorism Archive Project (CTAP). On 12 December 2013, writer and director Peter Berg came to Monterey, California, for a special pre-release screening of his new film, Lone Survivor. Based on the book of the same title by Marcus Luttrell, the film depicts Operation Red Wings...

Read More

CTAP Interview Part Two: A Roundtable Discussion of Lone Survivor

This interview is taken from the collection of the Combating Terrorism Archive Project (CTAP).1 On 12 December 2013, writer and director Peter Berg came to Monterey, California, for a special pre-release screening of his new film, Lone Survivor...

Read More

The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth

Mark Mazzetti's nonfiction thriller The Way of the Knife cap- MAJ Anthony A. Keller, U.S. Army captures the essence of the relationship between the U.S. Central Intelligence Agency (CIA) and U.S. Joint Special Operations Command (JSOC), while engaging the reader in a contemporary and easily comprehensible read. 

Read More

The Wire HBO Serial Television Drama, Created by David Simon

It's all about "the game." In HBO's The Wire, a crime drama series that aired from 2002 through 2008, the game is centered on the drug trade in present-day Baltimore and on the players' attempts to win—whether as a drug dealer controlling a corner or a police officer trying to make a difference.2 Despite the show's focus on domestic police work, it is full of excellent parallels and lessons that can easily be applied to the special operations and intelligence communities, or any organization that is involved in irregular warfare (IW) or unconventional warfare (UW)...

Read More


This journal is not an official DoD publication. The views expressed or implied within are those of the contributors and do not necessarily reflect the views of any governmental or nongovernmental organization or agency of the United States of America or any other country.


Copyright © 2023 by the author(s), except where otherwise noted. The Combating Threats Exchange journal (CTX) is a peer-reviewed, quarterly journal available free of charge to individuals and institutions. Copies of this journal and the articles contained herein may be printed or downloaded and redistributed for personal, research, or educational purposes free of charge and without permission, except if otherwise noted. Any commercial use of CTX or the articles published herein is expressly prohibited without the written consent of the copyright holder. The copyright of all articles published herein rests with the author(s) of the article, unless otherwise noted.


  • SALLY BAHO, Copy Editor
  • LAYOUT AND DESIGN, Graduate Education Advancement Center, Naval Postgraduate School


  • VICTOR ASAL, University of Albany SUNY
  • CHRIS HARMON, Marine Corps University
  • TROELS HENNINGSEN, Royal Danish Defense College
  • PETER MCCABE, Joint Special Operations University
  • RAJAN RAVINDRAN, Indian Army (Ret.)
  • IAN C. RICE, US Army (Ret.)
  • ANNA SIMONS, Naval Postgraduate School
  • SHYAMSUNDER TEKWANI, Asia-Pacific Center for Security Studies
  • CRAIG WHITESIDE, Naval War College


  • AMINA KATOR-MUBAREZ, Naval Postgraduate School