top of page
IMG_7058.JPG

Below you can find my trainings in

'
Intelligence' and 'Security Studies'

Terrorism and Counterterrorism
Screenshot 2025-10-27 at 01.05.53.png
Counter-Terrorism and Intelligence
Screenshot 2025-10-27 at 19.30.18.png
Screenshot 2025-10-31 at 12.43.27.png
Foreign Intelligence.png
Tech interception.png
humint.png
Screenshot 2024-11-07 at 12.03.59.png
ACADEMY OF FOREIGN AFFAIRS
Screenshot 2025-11-03 at 03.22.05.png
Screenshot 2024-11-07 at 16.42.38.png

Intelligence

The integration of digital technologies into everyday life has increased at an extraordinary pace in the world recent years, with the use of social media and other digital apps make vulnerabilities for people, companies and public institutions. 

 

While this trend offers a wide range of opportunities for development, the freedom of expression, political participation, and civic action, it also increases the risk of potentially vulnerable people, companies, public institution being exposed to terrorist online content produced by terrorist and violent extremist groups online.

From this perspective, today cyber attacks are used both as terrorist acts and are extensively used by marginal groups to data leakage and denail of corporate systems.

 

At this point, threat intelligence usage has become critically important. Intelligence activities have a history as old as human history. The need to obtain intelligence is rooted in human biological origins and has been used throughout history for survival and have power.

Today, both commercial companies and government institutions use intelligence to maintain operations, prevent information leaks, estabilish business continuity and anticipate potential attacks. Intelligence is not only technology oriented concept, also human-based (such as HUMINT), encompassing physical access, even intelligence is also used for market research, business investments, understand consumer behaviours and political decisions and approcahes.

To give examples of a physical security breach as part of intelligence gathering; smart building exploits, biometric hacks, audio surveillance, and drone surveillances would be good examples.

Physical security is just as crucial as cyber security, with emerging threats, making physical red teaming essential and simulations for identifying vulnerabilities. Physical security vulnerabilities pose just as significant a risk to companies, especially with the increasing convergence of physical and digital systems. Physical red teaming is a cutting-edge approach that simulates real-world attacks on physical security measures. The goal is to uncover potential weaknesses before malicious actors can exploit them. This team also use 'intelligence' methodologies.

Physical security vulnerabilities pose just as significant a risk to companies, especially with the increasing convergence of physical and digital systems. Physical red teaming is a cutting-edge approach that simulates real-world attacks on physical security measures. The goal is to uncover potential weaknesses before malicious actors can exploit them. HUMINT and its espionage approaches gives us a change to establish relationships with the people who works for companies and institutions to get info for unauthorized accessing.

During a red teaming exercise, security professionals attempt to breach physical security measures like locks, surveillance systems, access control, or personnel protocols. So, before this simulation it's important to use intelligence which comes from HUMINT activities. Corporations, government agencies, and other organizations with high-value assets often use this type of red teaming, but small businesses can also benefit from physical red teaming.

Today, there are also attackers who play roles as employees and/or suppliers, gaining unauthorized access and gathering information about company vulnerabilities to exploit commercial information.

These attackers can influence company/institution employees through HUMINT and espionage activities, thereby accessing company information and/or gathering intelligence on company vulnerabilities.

Therefore, it is essential for companies and institutions to conduct intelligence and use counterintelligence methodologies to be prepared for such potential situations.

 

On the other hand, as I mentioned above, some of the terrorist attacks are based on cyber attacks and technics. Cyber terrorism (also known as digital terrorism) is defined as disruptive attacks by recognised terrorist organisations against computer systems with the intent of generating alarm, panic, or the physical disruption of the information system. Attacker can manipulate signaling system, air traffic control, nuclear power plant systems, etc. and can access their control systems.

 

Briefly, Intelligence is a major topic today for every different countiries and companies. Intellignce is serious and scientific method, has scientific processes, and must be conducted scientifically. These processes also include psychological and manipulative methods even understand attachers behavious.

From this perspective, I believe that it’s important to understand terrorism and counterterrorism concepts, behaviors of attackers, psychology, ideology, motivations and technics, tactics in terms of protecting the systems & data of companies and institutions.

So, ‘intelligence and security studies’ would be most important and powerful parts of it.

 

In the light of this information, I really interested in ‘security studies’ and ‘Intelligence’ concept as a major part of my occupation and always develop myself by getting different and academic trainings.

© 2019 by Ziya Gokalp

  • Youtube
  • Pinterest
  • address-icon-white-12
  • LinkedIn - Beyaz Çember
  • him2
  • 500-px-icon-22
    bottom of page