Abstract
ABSTRACTA few years into the Iraq War, those engaged in that fight realized that the methods of intelligence analysis, refined in Cold War, were not sufficient for wartime. To manage the massive increase in intelligence data new analytic tools were adopted for unearthing and connecting key developments and individuals hidden from view within it. Only then could the secret networks of Iraqi insurgents be uncovered. Several of these changes were put into practice by the US counterterrorism force that deployed to Iraq as Task Force 714. The study describes what these changes encompassed, and how they were employed to support those given the mission of attacking and dismantling Al-Qaeda in Iraq’s networked underground.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.