Jim Garrett | American Military University (original) (raw)

Papers by Jim Garrett

Research paper thumbnail of Wagner Group Counterterrorist Financing Problems 2024 and Beyond

The Russian private military company (PMC) Wagner Group has been labeled a terrorist group by s... more The Russian private military company (PMC) Wagner Group has been labeled a terrorist group by several nations and a criminal organization by others. The PMC's deep ties to its home government provide it with several capabilities that make it highly resistant to counterterrorist financing (CTF) initiatives. This paper discusses some of Wagner Group's income streams and the difficulties that CTF agencies have in targeting the organization's finances.

Research paper thumbnail of OPSEC Lessons in History Operation Rainbow

In 1979, Soviet Spetsnaz officers of the KGB executed a daring operation to extract three allies ... more In 1979, Soviet Spetsnaz officers of the KGB executed a daring operation to extract three allies from Kabul, Afghanistan. To save the three men, all wanted fugitives marked for death; the Soviet special forces would have to take them out of the frying pan and into the fire. The highly skilled commandos knew their weapons would not get them home if their OPSEC was blown. Learn how the KGB managed to dodge a nationwide manhunt to rescue their assets and deliver them to freedom in the Soviet Union.

Research paper thumbnail of A Study of the Hafizullah Amin Assassination

I would also like to thank those that have helped me in my own understanding of the craft of exec... more I would also like to thank those that have helped me in my own understanding of the craft of executive protection. First and foremost, my mentor, Darryl Biggs. I have learned more from you from our talks and our work together than many interns could ever hope to learn. I am extremely thankful for everything you have done for me and helped me grow in this profession and as an individual.

Research paper thumbnail of OPSEC Lessons in History: Operation Big Wedding

The Indicator, 2019

On September 11th, 2001 nineteen al Qaeda operatives brought terrorism to America's shores in an ... more On September 11th, 2001 nineteen al Qaeda operatives brought terrorism to America's shores in an unprecedented fashion, killing nearly three thousand and injuring more than 25,000. How did this occur? Al Qaeda expertly wrapped their operations in secrecy, a pillar of their existence.

Research paper thumbnail of OPSEC Lessons in History: Operation Trojan Horse (The Waco Standoff)

The Indicator, 2018

In 1993 the Bureau of Alcohol, Tobacco, Firearms, and Explosives executed one of the most disastr... more In 1993 the Bureau of Alcohol, Tobacco, Firearms, and Explosives executed one of the most disastrous arrest warrants in US history. Their failure stemmed from incompetent OPSEC. Their loss of essential secrecy resulted in a sustained gunfight which they lost and developed into a 51-day siege. 86 people were killed in the fiasco including four ATF agents as well women, and children.

Research paper thumbnail of OPSEC Lessons in History: The Yom Kippur War

On October 6th, 1973 an Arab army comprised of forces from nine Arab nations launched a surprise ... more On October 6th, 1973 an Arab army comprised of forces from nine Arab nations launched a surprise attack on Israel. Despite many indicators Israel was taken by surprise. Careful attention was paid to OPSEC at the strategic level by the Arabs.

Research paper thumbnail of OPSEC Lessons in History: The Russian Invasion of Crimea 2014

The Russian military utilized Operations Security (OPSEC) masterfully during its opening days of ... more The Russian military utilized Operations Security (OPSEC) masterfully during its opening days of the invasion of Crimea. While holding the former Ukrainian region would require a deployment of thousands of troops over several weeks the victory goes to an initial small force that used confusion and secrecy to set conditions for a near bloodless invasion by the Russian military.

Research paper thumbnail of Criminal Intelligence: Challenges, Uses, and Methods

This page answers eight questions posed regarding law enforcement intelligence. The effectivenes... more This page answers eight questions posed regarding law enforcement intelligence. The effectiveness of US fusion centers is assessed. Challenges for law enforcement intelligence are described. Emerging methods are discussed. The terrorist attack cycle is described and suggestions on options for law enforcement intelligence to thwart attacks are provided. Issues for domestic terror investigations are discussed. The advantage of geospatial predictive analysis provided to law enforcement is described. The terms terrorist and extremist are contrasted. The process for intelligence production is described.

Research paper thumbnail of Wilhelm Stieber: King of the Sleuth Hounds

Wilhelm Stieber greatly advanced intelligence and counterintelligence. His ideas paved the way f... more Wilhelm Stieber greatly advanced intelligence and counterintelligence. His ideas paved the way for secret police forces and intelligence agencies for the future. He not only managed intelligence services but undertook dangerous work himself as an operative.

Research paper thumbnail of Human Intelligence: The Discipline the Intelligence Community Must Struggle to Recover

The United States' over-reliance on technical collection systems and reduced focus on human intel... more The United States' over-reliance on technical collection systems and reduced focus on human intelligence reduces our capability to target adversaries that operate minimally in a technological world. This paper covers the history of US HUMINT depreciation and discusses some intelligence failures from a pro-HUMINT stance.

Research paper thumbnail of Foreign Intelligence Surveillance Act Section 102: Modified for the War on Terror

Section 102 of the FISA Act covers surveillance of foreign persons or agents of foreign powers. ... more Section 102 of the FISA Act covers surveillance of foreign persons or agents of foreign powers. This section was modified following 9/11 to meet the US Government's needs in the War on Terror. However, there appears to be a far stretch of the imagination for even US legal advisors to claim that Section 102 authorizes mass collection programs such as PRISM.

Research paper thumbnail of The Intelligence Analyst - Policymaker Relationship

The appropriate proximity of analysts and policymakers is contested. Analysts must be close ... more The appropriate proximity of analysts and policymakers is contested. Analysts must be close enough to understand the needs of the policymaker to deliver an appropriate and tailored intelligence product. However, the analyst must be removed enough that they are not convinced to conform their analysis to support policy.

Research paper thumbnail of Internal Strife and Dissention in the Intelligence Community

The IC's history is one of competiveness among the DoD intelligence agencies, the FBI, and the CI... more The IC's history is one of competiveness among the DoD intelligence agencies, the FBI, and the CIA. The government has studied organizational issues and modified the IC multiple times, including enhancing the powers of the chief intelligence official. Vignettes are provided detailing specific incidents of intelligence failure that resulted from or were enhanced by an IC unwilling to work together.

Research paper thumbnail of Operation Badr's Bad Surprise: Arab Deception in the Yom Kippur War

The Arab nations of Egypt and Syria achieved strategic surprise in the Yom Kippur War. Understan... more The Arab nations of Egypt and Syria achieved strategic surprise in the Yom Kippur War. Understanding of Israeli cognitive biases allowed the Arabs to craft a denial and deception plan that fed the Israeli's beliefs and clouded their judgment.

Research paper thumbnail of Presidential Findings, Covert Operations, and Clandestine Operations: Understanding the Secretive World of Intelligence Operations

The Presidential Finding is significant document that expands the Presidential accountability and... more The Presidential Finding is significant document that expands the Presidential accountability and Congressional control of covert action. Presidential Findings are required for covert activities but not for clandestine activities. Clandestine activities secretly conduct intelligence collection. Covert activities seek to influence a government, population, or segment thereof to make a change in support of national foreign policy objectives.

Research paper thumbnail of Removing the Kid Gloves: Repealing the US Prohibition on Assassination

This paper argues that the US Government should repeal the ban on assassination. The argument li... more This paper argues that the US Government should repeal the ban on assassination. The argument lies in the following principles. The United States already employs an assassination program under the guise of politically correct language. Assassination causes fewer casualties than open war and is therefore Just War compliant. Other nations recognize assassination as a necessary weapon to protect their national security. It is significant that readers understand an open assassination policy would benefit the United States by increasing our credibility, pre-empting attacks on US assets or retaliating proportionally rather than entering into local, regional, or international conflicts. Also readers must understand that assassination is an acceptable practice for national security assurance by nations around the globe, not a vilified act that is conducted solely by the United States.

Research paper thumbnail of Perception Bias and the Cuban Missile Crisis

This paper explains how personal bias and misconceptions about Cuban intelligence led to the US I... more This paper explains how personal bias and misconceptions about Cuban intelligence led to the US Intelligence Community’s (IC) failure to recognize the deployment of Soviet missiles to
the island nation in 1962. The IC did not give credence to indicators that did not comply with
their own beliefs, leading to a major security concern on our southeast coast. They also fell victim to mirror imaging. This historical intelligence failure is a lesson to today’s IC to
understand how when personal biases and perceptions, combined with an enemy’s denial and
deception campaign, can cause grave danger to national security.

Research paper thumbnail of Wagner Group Counterterrorist Financing Problems 2024 and Beyond

The Russian private military company (PMC) Wagner Group has been labeled a terrorist group by s... more The Russian private military company (PMC) Wagner Group has been labeled a terrorist group by several nations and a criminal organization by others. The PMC's deep ties to its home government provide it with several capabilities that make it highly resistant to counterterrorist financing (CTF) initiatives. This paper discusses some of Wagner Group's income streams and the difficulties that CTF agencies have in targeting the organization's finances.

Research paper thumbnail of OPSEC Lessons in History Operation Rainbow

In 1979, Soviet Spetsnaz officers of the KGB executed a daring operation to extract three allies ... more In 1979, Soviet Spetsnaz officers of the KGB executed a daring operation to extract three allies from Kabul, Afghanistan. To save the three men, all wanted fugitives marked for death; the Soviet special forces would have to take them out of the frying pan and into the fire. The highly skilled commandos knew their weapons would not get them home if their OPSEC was blown. Learn how the KGB managed to dodge a nationwide manhunt to rescue their assets and deliver them to freedom in the Soviet Union.

Research paper thumbnail of A Study of the Hafizullah Amin Assassination

I would also like to thank those that have helped me in my own understanding of the craft of exec... more I would also like to thank those that have helped me in my own understanding of the craft of executive protection. First and foremost, my mentor, Darryl Biggs. I have learned more from you from our talks and our work together than many interns could ever hope to learn. I am extremely thankful for everything you have done for me and helped me grow in this profession and as an individual.

Research paper thumbnail of OPSEC Lessons in History: Operation Big Wedding

The Indicator, 2019

On September 11th, 2001 nineteen al Qaeda operatives brought terrorism to America's shores in an ... more On September 11th, 2001 nineteen al Qaeda operatives brought terrorism to America's shores in an unprecedented fashion, killing nearly three thousand and injuring more than 25,000. How did this occur? Al Qaeda expertly wrapped their operations in secrecy, a pillar of their existence.

Research paper thumbnail of OPSEC Lessons in History: Operation Trojan Horse (The Waco Standoff)

The Indicator, 2018

In 1993 the Bureau of Alcohol, Tobacco, Firearms, and Explosives executed one of the most disastr... more In 1993 the Bureau of Alcohol, Tobacco, Firearms, and Explosives executed one of the most disastrous arrest warrants in US history. Their failure stemmed from incompetent OPSEC. Their loss of essential secrecy resulted in a sustained gunfight which they lost and developed into a 51-day siege. 86 people were killed in the fiasco including four ATF agents as well women, and children.

Research paper thumbnail of OPSEC Lessons in History: The Yom Kippur War

On October 6th, 1973 an Arab army comprised of forces from nine Arab nations launched a surprise ... more On October 6th, 1973 an Arab army comprised of forces from nine Arab nations launched a surprise attack on Israel. Despite many indicators Israel was taken by surprise. Careful attention was paid to OPSEC at the strategic level by the Arabs.

Research paper thumbnail of OPSEC Lessons in History: The Russian Invasion of Crimea 2014

The Russian military utilized Operations Security (OPSEC) masterfully during its opening days of ... more The Russian military utilized Operations Security (OPSEC) masterfully during its opening days of the invasion of Crimea. While holding the former Ukrainian region would require a deployment of thousands of troops over several weeks the victory goes to an initial small force that used confusion and secrecy to set conditions for a near bloodless invasion by the Russian military.

Research paper thumbnail of Criminal Intelligence: Challenges, Uses, and Methods

This page answers eight questions posed regarding law enforcement intelligence. The effectivenes... more This page answers eight questions posed regarding law enforcement intelligence. The effectiveness of US fusion centers is assessed. Challenges for law enforcement intelligence are described. Emerging methods are discussed. The terrorist attack cycle is described and suggestions on options for law enforcement intelligence to thwart attacks are provided. Issues for domestic terror investigations are discussed. The advantage of geospatial predictive analysis provided to law enforcement is described. The terms terrorist and extremist are contrasted. The process for intelligence production is described.

Research paper thumbnail of Wilhelm Stieber: King of the Sleuth Hounds

Wilhelm Stieber greatly advanced intelligence and counterintelligence. His ideas paved the way f... more Wilhelm Stieber greatly advanced intelligence and counterintelligence. His ideas paved the way for secret police forces and intelligence agencies for the future. He not only managed intelligence services but undertook dangerous work himself as an operative.

Research paper thumbnail of Human Intelligence: The Discipline the Intelligence Community Must Struggle to Recover

The United States' over-reliance on technical collection systems and reduced focus on human intel... more The United States' over-reliance on technical collection systems and reduced focus on human intelligence reduces our capability to target adversaries that operate minimally in a technological world. This paper covers the history of US HUMINT depreciation and discusses some intelligence failures from a pro-HUMINT stance.

Research paper thumbnail of Foreign Intelligence Surveillance Act Section 102: Modified for the War on Terror

Section 102 of the FISA Act covers surveillance of foreign persons or agents of foreign powers. ... more Section 102 of the FISA Act covers surveillance of foreign persons or agents of foreign powers. This section was modified following 9/11 to meet the US Government's needs in the War on Terror. However, there appears to be a far stretch of the imagination for even US legal advisors to claim that Section 102 authorizes mass collection programs such as PRISM.

Research paper thumbnail of The Intelligence Analyst - Policymaker Relationship

The appropriate proximity of analysts and policymakers is contested. Analysts must be close ... more The appropriate proximity of analysts and policymakers is contested. Analysts must be close enough to understand the needs of the policymaker to deliver an appropriate and tailored intelligence product. However, the analyst must be removed enough that they are not convinced to conform their analysis to support policy.

Research paper thumbnail of Internal Strife and Dissention in the Intelligence Community

The IC's history is one of competiveness among the DoD intelligence agencies, the FBI, and the CI... more The IC's history is one of competiveness among the DoD intelligence agencies, the FBI, and the CIA. The government has studied organizational issues and modified the IC multiple times, including enhancing the powers of the chief intelligence official. Vignettes are provided detailing specific incidents of intelligence failure that resulted from or were enhanced by an IC unwilling to work together.

Research paper thumbnail of Operation Badr's Bad Surprise: Arab Deception in the Yom Kippur War

The Arab nations of Egypt and Syria achieved strategic surprise in the Yom Kippur War. Understan... more The Arab nations of Egypt and Syria achieved strategic surprise in the Yom Kippur War. Understanding of Israeli cognitive biases allowed the Arabs to craft a denial and deception plan that fed the Israeli's beliefs and clouded their judgment.

Research paper thumbnail of Presidential Findings, Covert Operations, and Clandestine Operations: Understanding the Secretive World of Intelligence Operations

The Presidential Finding is significant document that expands the Presidential accountability and... more The Presidential Finding is significant document that expands the Presidential accountability and Congressional control of covert action. Presidential Findings are required for covert activities but not for clandestine activities. Clandestine activities secretly conduct intelligence collection. Covert activities seek to influence a government, population, or segment thereof to make a change in support of national foreign policy objectives.

Research paper thumbnail of Removing the Kid Gloves: Repealing the US Prohibition on Assassination

This paper argues that the US Government should repeal the ban on assassination. The argument li... more This paper argues that the US Government should repeal the ban on assassination. The argument lies in the following principles. The United States already employs an assassination program under the guise of politically correct language. Assassination causes fewer casualties than open war and is therefore Just War compliant. Other nations recognize assassination as a necessary weapon to protect their national security. It is significant that readers understand an open assassination policy would benefit the United States by increasing our credibility, pre-empting attacks on US assets or retaliating proportionally rather than entering into local, regional, or international conflicts. Also readers must understand that assassination is an acceptable practice for national security assurance by nations around the globe, not a vilified act that is conducted solely by the United States.

Research paper thumbnail of Perception Bias and the Cuban Missile Crisis

This paper explains how personal bias and misconceptions about Cuban intelligence led to the US I... more This paper explains how personal bias and misconceptions about Cuban intelligence led to the US Intelligence Community’s (IC) failure to recognize the deployment of Soviet missiles to
the island nation in 1962. The IC did not give credence to indicators that did not comply with
their own beliefs, leading to a major security concern on our southeast coast. They also fell victim to mirror imaging. This historical intelligence failure is a lesson to today’s IC to
understand how when personal biases and perceptions, combined with an enemy’s denial and
deception campaign, can cause grave danger to national security.