Abstract

ABSTRACTA few years into the Iraq War, those engaged in that fight realized that the methods of intelligence analysis, refined in Cold War, were not sufficient for wartime. To manage the massive increase in intelligence data new analytic tools were adopted for unearthing and connecting key developments and individuals hidden from view within it. Only then could the secret networks of Iraqi insurgents be uncovered. Several of these changes were put into practice by the US counterterrorism force that deployed to Iraq as Task Force 714. The study describes what these changes encompassed, and how they were employed to support those given the mission of attacking and dismantling Al-Qaeda in Iraq’s networked underground.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call