The Art of War by Sun Tzu

The Art of War (孙子兵法, literally "Sun Tsu's military strategy") is a Chinese military treatise written during the 6th century BC. Composed of 13 chapters, each of which is devoted to one aspect of warfare, it has long been praised as the definitive work on military strategies and tactics of its time.

Unrestricted Warfare by Senior Colonel Qiao Liang and Senior Colonel Wang Xiangsui, PLA

Unrestricted Warfare (超限战, literally "warfare beyond bounds") is a book on military written in 1999. Its primary concern is how a nation such as China can defeat a technologically superior opponent (such as the United States) through a variety of means. Rather than focusing on direct military confrontation, this book instead examines a variety of other means.

Emerging U.S. Commercial Remote Sensing Satellite Firms: An Overview

Full RAND Report
USGS Commercial Remote Sensing Space Policy (CRSSP)
Commercial Imagery Available from the U.S. Government
USGS Imagery Products:

RADARSAT (Canada)

IRS (India)

Russian GIS НОВОСИБИРСК, РОССИЯ

(U) Signal Intelligence

(U) NSA SIGINT Overview
(U) NSA/CSS SIGINT FAQs
(U) Interception Capabilities
(U) Traffic Analysis Capabilities
(U) TEMPEST
(U) ECHELON

SIGINT Operational Platforms by Nation
Eye on SIGINT: The New Electronic Warfare
Prophet

Tactical SIGINT: Tagging, Tracking and Locating via Low-level Voice Intercept (LLVI), ground surveillance radar (GSR), direction finding (DF), Precision Geo-Location (PGL), and electronic attack (EA). Techniques include Watson-Watt, pseudo-doppler, correlative interferometer, TDOA, FDOA, beam forming, null steering, and higher-order statistics approaches. Documents

(U) FM 3-05.102 Army Special Operations Forces Intelligence (Inactive Publication)
(U) AR 190-53 Interception of Wire and Oral Communications for Law Enforcement Purposes

(U) FM 2-22.401 Multi-Service Tactics, Techniques and Procedures for Technical Intelligence Operations
(U) FM 3-90.15 Sensitive Site Operations

State of the Art: Competitive Intelligence

A Competitive Intelligence Foundation Research report 2005-2006, Executive Summary

A snapshot of who we are (competitive intelligence professionals), what we are doing (what competitive intelligence is), and who we are doing it for (clients and companies). Based on answers supplied by 520 CI professionals.

The Competitive Intelligence Foundation, a SCIP-supported 501(C)3 non-profit corporation, develops and promotes the body of knowledge for the competitive intelligence community through research and education. This study was jointly developed by the Competitive Intelligence Foundation and Cipher Systems.

Pre-Incident Indicators of Terrorist Activities

The Identification of Behavioral, Geographic, and Temporal Patterns of Preparatory Conduct by Brent L. Smith; Kelly R. Damphousse; Paxton Roberts. May 2006

Studies the relationship between preparatory and ancillary behaviors, both criminal and noncriminal, of terrorist group members and the terrorist acts they eventually plan or carry out. The goal of the study was to identify patterns of conduct that might lead to intervention prior to the commission of actual terrorist incidents.

Inventory and Assessment of Databases Relevant for Social Research on Terrorism by Alice R. Buchalter and Glenn E. Curtis

A Report Prepared by the Federal Research Division, Library of Congress under an Interagency Agreement with the National Institute of Justice, November 2003.

This report provides a description and assessment of Internet-accessible databases relevant for social science research on terrorism. The body of this report details those websites that provide actual data, e.g., names of terrorist organizations and incidents of terrorist activity; several have search capabilities. These websites are maintained primarily by U.S. government agencies, non-U.S. research centers, and international organizations. An appendix to this report provides an extensive list of additional resources that provide commentary and analysis of terrorism events and trends. These resources are derived from the U.S. government, libraries, international agencies, government and private non-U.S. agencies and institutes, and academic-based domestic organizations.

The Sociology and Psychology of Terrorism: Who becomes a Terrorist and Why? by Rex A. Hudson

A Report Prepared under an Interagency Agreement by the Federal Research Division, Library of Congress, September 1999.

The purpose of this study is to focus attention on the types of individuals and groups that are prone to terrorism in an effort to help improve U.S. counterterrorist methods and policies.

Intelligence Community Case Method Program by Col. Thomas W. Shreeve

As an intelligence professional, you can use case studies to get training in analyzing complex problems, making decisions, and devising courses of action on the job. When you study cases from the Intelligence Community Case Method Program, you practice grappling with tough, real-life dilemmas in analyzing intelligence, conducting clandestine operations, managing security threats, and carrying out other business of an intelligence service. You learn in the process to come up with workable solutions in a classroom where you can get constructive criticism from your colleagues and an instructor. The program's cases are true accounts of problems that occurred as part of the Intelligence Community's operations and activities.

The method has proved highly useful in helping intelligence professionals get better at exercising sound judgment, making decisions, and explaining the reasoning behind their positions. It strengthens their ability to think critically, a skill that is especially needed when their work requires making decisions based on ambiguous or incomplete information.