Fusion nodes: the next step in combating the global terrorist threat

Approved for public release; distribution is unlimited === Implementing a proactive approach to deny, disrupt, and defeat terrorist networks that threaten U.S. national interests is a critical capability required by the U.S. government. The challenge arising from these threats stems from the semi- a...

Full description

Bibliographic Details
Main Authors: Shaw, Timothy R., Pollio, Anthony F.
Other Authors: Borer, Douglas
Published: Monterey, California. Naval Postgraduate School 2012
Online Access:http://hdl.handle.net/10945/10692
Description
Summary:Approved for public release; distribution is unlimited === Implementing a proactive approach to deny, disrupt, and defeat terrorist networks that threaten U.S. national interests is a critical capability required by the U.S. government. The challenge arising from these threats stems from the semi- and non-permissive environments where U.S. freedom of action is reduced or non-existent. The purpose of this thesis is to propose a system that effectively integrates intelligence and operations in order to conduct a proactive method to global counter-terrorism (CT) operations in these arenas. This system is based on the Network Targeting Cycle- Find, Fix, Finish, Exploit, and Analyze (F3EA) utilized by USSOF most recently in Iraq and Afghanistan, but also in the recent past during the conflict in Vietnam and narco-terrorism operations in South America. The scope of this thesis is to examine how the U.S. military can develop a global CT approach using the F3EA process based on an interagency, allied, and host-nation collaborative environment.