THE PAPER | U.S. Intelligence Community's Performance Against al-Qaeda Since 1988

This paper will begin by defining al-Qaeda as a tripartite entity consisting of a hard-core, a network, and an ideology. In three chronological sections, this reality will be compared with the American intelligence community’s perception of, and performance against, al-Qaeda during each time frame, so as to evaluate the success of American intelligence in the war on terror.

By Lucie Parker 
King's College, London

How has the American Intelligence Community Performed against Al-Qaeda, in its Various Manifestations, Since the Organisation’s Creation?

This paper will begin by defining al-Qaeda as a tripartite entity consisting of a hard-core, a network, and an ideology. In three chronological sections, this reality will be compared with the American intelligence community’s perception of, and performance against, al-Qaeda during each time frame, so as to evaluate the success of American intelligence in the war on terror. Section one will demonstrate America to be blind to the horizontal nature of al-Qaeda, arguing that the intelligence community’s outdated Cold War structure limited its performance against the perceived enemy. As a result, the intelligence community was unable to both fulfil President Bill Clinton’s counter-terror policy, as well as engage with al-Qaeda successfully during this time. Section two will highlight the positive impact 9/11 had upon waking America up to the reality of al-Qaeda, unleashing the resources needed by the intelligence community to fulfil President George W. Bush’s objectives. Yet despite this epiphany, the intelligence cycle was still geared towards a vertical threat and thus was unable to perform successfully against the three facets of al-Qaeda. Finally, section three will acknowledge the intelligence community’s success against the al-Qaeda hard-core, due to the improvement in intelligence cycle tactics, yet show that the neglect of al-Qaeda’s ideology in Obama’s strategy means that America still faces the threat of Islamic extremist ideology today.

THE PAPER | U.S. Intelligence Community's Performance Against al-Qaeda Since 1988

A New National Security Threat

President Obama’s recent declaration that ‘al-Qaeda is on its heels’ (2014) reinvigorated debate over the prominence of arguably the gravest threat the United States has faced in the 21st century. This debate stems from the complexity of al-Qaeda; gone are the Cold War days of a monolithic Soviet Union versus America, rather a multifaceted Islamic extremist militancy poses the biggest challenge to US national security today. In order to evaluate the success of America’s response to this threat, we must scrutinise the performance of ‘Uncle Sam’s lifeblood in the campaign against terrorism’ (Cilluffo et al., 2002: 61): American intelligence. The issue at stake here is not only our understanding of the battle between the world’s greatest intelligence power and al-Qaeda; we must also seek to comprehend whether the intelligence cycle has been effectively handled to fight al-Qaeda in line with policy requirements. This analysis is thus twofold. The first strand will confront how successful the intelligence community was in helping ‘policymakers overcome insurmountable obstacles’ (Tenet, 2000: 134) against al-Qaeda, using how well it informed American policy as a benchmark against which to measure performance. The second will measure the impact this performance had on eliminating al-Qaeda. Analysing a community which is by its very nature clandestine does engender limitations; the restriction to classified information does problematize an open-source appraisal like this one. Yet using government policy as a benchmark opens a wealth of open-source material that provides a realm of relevant intelligence, such as the 9/11 commission report.

Before commencing this investigation, defining ‘al-Qaeda’ is crucial. Whilst the breadth of this paper is not wide enough to do justice to the thorny debate surrounding al-Qaeda’s existence, Burke captures the characterisation of this entity well. He argues that al-Qaeda consists of ‘three elements: a hard-core, a network of co-opted groups, and an ideology’ (2003: 8). He disregards the popular media perception of ‘al-Qaeda as an “evil empire” with an evil mastermind at its head’ (2003, XXV), demonstrating that al-Qaeda is a de-centralised, horizontal network that comprises one of many Islamic militant groups. The hard-core is comprised of Osama bin Laden and his close associates, whilst the network is formed of ever-changing groups who have ‘multiple associations and multiple lines of logistic support’ (2003: 11)—the former Egyptian al-Jihad is but one example. The ideology is the ‘al-Qaeda worldview’: the aim to fundamentally establish a ‘caliphate’ based on an extreme, Wahhabi interpretation of Sunni Islam. Burke’s explanation of the fluidity of al-Qaeda is an invaluable element of the definition; the changed reality of al-Qaeda is outlined in each section to provide a clear understanding of the threat that the American intelligence community is being judged against at that point in time.

1988–2001

America here faced a ‘networked organisation of small dispersed units’ characterised by ‘doctrine, configuration, strategy and technology in sync with the information age’. A ‘child of 1990’s globalisation’, al-Qaeda was a sprawling web of the informal connections that had solidified in 1988 between a ‘new generation of Sunni Islamic terrorists’ (Coll, 2004: 278). Access to Afghanistan from 1996 gave the al-Qaeda hard-core its base, from which bin Laden established ‘an unknown number of “sleeper” cells awaiting orders to launch future attacks’ (Shultz, 2003: 8-15). The Encyclopaedia of Jihad provided the formula of unconventional warfare; the internet cultivated the coordination required for the planning of these attacks. The result was ‘a campaign of episodic attacks by various nodes of his network’ (Shultz, 2003: 21), e.g. the 2000 USS Cole bombing in Yemen. Bin Laden’s 1998 fatwa ordering Muslims to ‘kill Americans – including civilians – anywhere in the world’ (Shultz, 2003: 22) made America the central target of this campaign. Yet America’s understanding of this new enemy was inaccurate. ‘By the middle of the decade, America discovered that ‘UBL was the head of a worldwide terrorist organisation with a board of directors…and that he wanted to strike the U.S. on our soil’ (Tenet, 2007: 100-102), however al-Qaeda was still treated as a ‘traditionally structured terrorist organisation’ (Burke, 2003:6). The responses American intelligence thus formulated against this enemy were inevitably unsuitable and largely ineffective.

the 2000 USS Cole bombing in Yemen.


The CIA provides a useful illustration of America’s ill-suited response. During the 1990’s it was near rock bottom. Constant budgetary cuts hindered a restructuring overhaul, keeping it institutionally geared towards a SIGINT strategy that focused on a monolithic enemy. Although SIGINT provided some valuable intelligence on al-Qaeda, e.g. the NSA tapped bin Laden’s phone, the fact that HUMINT declined by 25% during the 1990’s (Diamond, 2008: 242) was palpable, especially when bin Laden changed his communication method. The fact that there was ‘no CIA station in Afghanistan from which to collect intelligence’ (Coll, 2004: 5) meant that the Langley-based Alec Station failed to collect ‘high-quality intelligence coming from sources within al-Qaeda’ (Diamond, 2008: 243). Accordingly, the intelligence community failed to understand al-Qaeda. Wright highlights that these ‘radical extremists came from places few agents had ever been to’ (2006: 208); the necessity of getting agents into these places to gain an understanding of them was paramount.

These structural problems hindered analysis. The lack of intelligence collected on al-Qaeda meant that America still was blind to the ‘jungle of poisonous snakes’ (Woolsey, cited in Ciluffo et al., 2002: 62) that were mobilising against them. As intelligence analysis was solely focused on bin Laden (epitomised in the fact there was a ‘bin Laden’ station, not an ‘al-Qaeda’ station), any valuable intelligence that stemmed from one of the ‘snakes’ in the expansive al-Qaeda jungle was not given the necessary attention: the East African al-Qaeda cell was picked up years before the embassy bombings, yet lack of analysis due to the misunderstanding of al-Qaeda’s structure resulted in a fatal failure. Zegart outlines the intelligence community’s failure to piece together the evidence:

‘Khalid al-Mihdhar and Nawaf al-Hamzi had attended an al-Qaeda meeting in Malaysia with a major bin Laden figure; that al-Mihdhar held a U.S. visa; and that al-Hazmi had already travelled to the United States; that KSM, one of bin Laden’s most trusted operatives was recruiting terrorists to travel to, and plan terrorist activities in, the United States, that dramatic spikes in intelligence chatter suggested an imminent catastrophic terrorist attack against American targets somewhere in the world; and that a star FBI agent believed that bin Laden might be sending operatives to the U.S. for flight training’ (2007: 28-9)

The intelligence community’s focus upon bin Laden as the figurehead of a criminal organisation bound them rigidly to a vertical analytical focus. Although the ‘Manson group’ had the right idea with holistically mapping out Islamist networks (Coll, 2004), they were ignored by those out in the field because this holistic intelligence was not operational against the perceived threat. The CIA had been tasked with bin Laden’s capture; this analysis was of no use to something that required operational real-time intelligence.

The failure to collect HUMINT from inside al-Qaeda, as well as to analyse its holistic horizontalness, resulted in poor dissemination of intelligence to both Clinton and Bush, which then led to an uninformed counter-terror policy. The major criticism here was that the ‘CIA was giving Clinton too much unfiltered intelligence’ (Coll, 2004: 418). The lack of actionable intelligence from human sources was problematic, as seen with the Bush administration: the infamous August 6th 2001 Presidential Daily Briefing simply reported that ‘bin Ladin since 1997 has wanted to conduct terrorist attacks in the US’ (PDB, 2001); a phenomenon that was not new to America in 2001. Rather than disseminating concise intelligence to inform policy, the intelligence community ‘generated volumes of fragmented hearsay’ (Coll, 2004: 526) that lacked utility.

The intelligence cycle thus failed to support policy. Through Presidential directive-39, Clinton’s ‘intent regarding covert action against bin Laden was clear: he wanted him dead’ (Zelikow et al., 2004: 133). However the failures of the Tarnak Farm, Desert Camp and Kandahar plans to even materialise demonstrates that the CIA did not fulfil this role, with Tenet admitting that ‘as much as we all wanted bin Laden dead, we didn’t have enough information to give policymakers the confidence they required to pull the trigger’ (Tenet, 2007: 112). Under the Bush administration, Clinton’s bin Laden-centric counter-terrorist policy took a backseat: the Principals Committee had its first meeting on al Qaeda on September 4th 2001 (Zelikow et al., 2004: 212). As the intelligence community had no clear direction assigned to them by Bush against al-Qaeda pre-9/11, it is impossible to criticise them against a non-existent benchmark. Holistically, the intelligence community also performed badly in their fight against al-Qaeda’s network. A vertically stale CIA hindered an accurate understanding of this horizontal enemy, preventing the adoption of successful counter-terror tactics. Intelligence thus failed within the microcosm of American counter-terror policy, as well as failed to effectively disrupt al-Qaeda, as was tragically reflected by the 9/11 attacks.

2001–2003

9/11 provoked the Bush doctrine’s two objectives: ‘to break the network of terrorist states’ (Wolfowitz, 2001) responsible for 9/11, and ‘to prevent regimes that sponsor terror from threatening America’ (Bush, 2002). The U.S. invasion of Afghanistan scattered the hard-core, eliminating two thirds in the process. Meanwhile, the networks were ‘disrupted by new campaigns by security forces all over the world’. Yet rather than destroying al-Qaeda, the networks simply ‘dispersed and caused significant radicalisation wherever they ended up’, for example in Pakistan. Consequently the reality of 2001 was a ‘new phase of Islamic militancy’, with a new style of attacks ‘executed by men who were committed to the al-Qaeda agenda but in no way connected with the group itself’ (Burke, 2003: 260-266), e.g. the 2002 Bali bombings. Although the hard-core was diminishing, the network of networks and their ideology enshrined al-Qaeda’s existence. America’s understanding of al-Qaeda at this point was epitomised in Bush’s hit list of the ‘hardest of the “al-Qaeda hard-core”’ kept in his desk (Burke, 2003: 259). Although Bush acknowledged this ‘new kind of war fought by a new kind of enemy’ (2002), the black and white hunt for bin Laden and his associates suggests that his focus upon this vertical elite was the priority. Thus although 2001–2003 was a pivotal moment for the American understanding of the nature of al-Qaeda, their intelligence tactics did not match their 9/11-induced epiphany.

CIA Special Forces in Afghanistan 2001–2003


Tenet’s long-cherished ambition of getting HUMINT from Afghanistan was fulfilled via the invasion, giving the intelligence community ‘access to people and documents that laid bare the future plans and intentions of al-Qa’ida’: the capture of KSM is one example. Furthermore, Tenet’s introduction of ‘a daily meeting’ to ‘cut short the time it took for information to flow from the people in the field to me’ (2007: 229-31) collected a greater volume of information to be coordinated horizontally with the CIA, FBI, NSA, and military. 9/11 also sanctioned unprecedented intelligence community powers: the NSA ‘terrorist surveillance program’ and the 2001 Memorandum of Understanding assigning covert action authorities to the CIA. Yet the set-up of ‘black sites’ to interrogate and torture captured al-Qaeda members, e.g. Abu Zubaydah, as a result of the latter authority, demonstrated that despite their fundamental reassessment of the reality of al-Qaeda, America still misunderstood their enemy. The hatred of the West generated by al-Qaeda’s ideology was vindicated through America’s use of these techniques upon their ‘brothers’. Rather than providing strong intelligence to aid America successfully against al-Qaeda, torture added fuel to the long-burning ideological hatred towards the West, indirectly sustaining the al-Qaeda franchise that was mobilising against them.

Analysis and dissemination were vastly improved due to 9/11. This is seen with the creation of the ‘threat matrix’: a daily document given to Bush that detailed ‘the newest threats that had emerged over the past twenty-four hours’. It was ‘an unprecedented mechanism for systematically…debunking the voluminous amount of threat data flowing into the intelligence community’, ensuring that only the intelligence ‘with the necessary weight and quality’ consumed the President’s attention. The establishment of an ‘imagination’ group by Tenet, assigned to brainstorm ideas outside of the box further unbound intelligence analysis from its Cold War strait jacket, allowing analysts to uncover the reality of al-Qaeda. The fact that Bush ‘was in the trenches with us’ meant that intelligence was rapidly communicated: ‘if you told him about an imminent operation on Monday, you could be certain after a few days he would ask about it’ (Tenet, 2007: 232-36).

The shock of 9/11 unleashed the resources needed for the intelligence community to break free from their Cold War structure and execute a strong intelligence cycle geared towards al-Qaeda’s defeat. Consequently they were better equipped to deal with the increased demands of the Bush administration’s counter-terror doctrine. Although they were unable to capture bin Laden or al-Zawahiri during this period, their success is seen in the capture of KSM, amongst others (Tenet, 2007: 240). This intelligence community action thus fulfilled Bush’s cry ‘to find [terrorists] before they strike’ (2001). The increased understanding America held of al-Qaeda’s nature, combined with the intelligence community’s unprecedented authority and structural mobilisation, could have resulted in phenomenal results. However it is obvious here that the intelligence community was still adapting to this threat. America acknowledged al-Qaeda as a global network of cells, yet set out only to destroy the hard-core by ‘mapping the organisation in a traditional military structure, with tiers and rows’ (McChrystal, 2011). Although their perception of al-Qaeda was more accurate to its reality, their maintenance of old tactics hindered their performance.

2003–Present

Al-Qaeda’s remarkably ‘flexible organisation that exercises both top-down and bottom-up planning and operational capabilities’ (Hoffman, cited in Jordan, 2014: 4) has ensured its survival today, with ‘much of its hierarchical structure operational in Pakistan, thus enabling it to carry out new attacks in the West’ (Jordan, 2014: 4), e.g. Madrid 2004 and London 2005. Survival is continued through its franchise of networks, with its brand ‘spreading like wildfire’ (Kagan, 2014), as seen with groups like Al-Qaeda in the Arabian Peninsula (AQAP). Yet America argues that they are ‘within reach of strategically defeating al-Qaeda’ (Panetta, cited in Katulis and Juul, 2011), with Bin Laden’s death hailed as a poignant milestone. The gap between the reality and the U.S. policymaker’s understanding of al-Qaeda is apparent again here. The Obama administration ‘considers al-Qaeda primarily to be the group of individuals comprising its leadership during, and having involvement in, the September 11 attacks’ (Jan, 2014). Although 2001-2003 unveiled to America the tripartite identity of their enemy, Obama’s limited definition neglects this identity. It continues to frame al-Qaeda vertically, thus stifling the intelligence community’s capacity to perform successfully against it.

Using the al-Qaeda in Iraq insurgency as a case study, McChrystal demonstrates that the tactics used by the intelligence community caught up with their new understanding of al-Qaeda. The realisation that ‘to defeat a networked enemy we had to become a network ourselves’ created ‘F3EA: find, fix, finish, exploit, and analyse’. Intelligence was collected through raids, such as cell phones, and sent straight to analysts, who ‘turned this raw information into usable knowledge’. This knowledge was disseminated to people ‘from multiple units and agencies’. Intelligence was shared horizontally, and ‘decisions were decentralised and cut laterally across the organisation’ (2011). This new intelligence cycle informed the CIA’s primary covert action tactic against al-Qaeda: targeted killings of the al-Qaeda leadership through drone strikes, such as Anwar al-Awlaki. A classified CIA paper from 2007 concluded that ‘al-Qaeda was at its most dangerous since 2001 because of the base of operations that militants had established in North Waziristan’ (cited in Jordan, 2014), thus ‘CIA attacks have struck Pakistan’s tribal areas on average once every five days during Obama’s first term’ (Ross et al., 2012). These aggressive attacks on the al-Qaeda network have been successful: the killing of bin Laden through ‘spot-on intelligence by the CIA’ (O’Neill, 2014) is one example. There is a strong argument here that the intelligence community’s actions have pushed al-Qaeda onto the defensive, with ‘those who remain…just trying to survive’ (Hanif cited in Yousafzai, 2012); al-Qaeda members have been forced ‘to devote substantial attention and energy to self-protection’, rather than to executing attacks. This is empirically substantiated; during 2001-2006 there were three major success operations (9/11, Madrid and London), whereas during 2007-2012 thirteen operations did not result in a single successful attack (Jordan, 2014).

Subsequently, the intelligence community’s re-mobilisation of the intelligence cycle in line with an evolved understanding of al-Qaeda, culminating in the successful elimination of bin Laden and others, sufficiently fulfilled Obama’s policy. He ‘directed [Panetta] to make the killing or capture of Osama bin Laden the top priority in [America’s] war to defeat al Qaeda’, and this resulted in ‘one of the greatest intelligence successes in American history’ (Obama, 2011). Yet although the intelligence community was successful within the confines of Obama’s counter-terror strategy, their overall performance against al-Qaeda was lacking. The CIA’s use of covert action outlined that the U.S. still misunderstood a key element of the al-Qaeda identity: ideology. Obama’s narrow definition of al-Qaeda meant that the intelligence community excluded ‘large portions of the al-Qaeda network from consideration’ (Zimmerman, 2014), failing to fully engage with the entirety of their enemy. Furthermore, their new tactics actually strengthened al-Qaeda’s ideology; the killing of innocent Muslims as collateral damage from drones has increased radicalisation globally. Thus the intelligence community has performed unsuccessfully against ‘al-Qaedaism’, demonstrating their ignorance of it through the use of controversial tactics. This reinforces the stark gap between America’s perception of their performance and the realityof their performance against al-Qaeda.

The American intelligence community has failed so far to perform to the extent of their capabilities against al-Qaeda. The pre-9/11 misjudgement of al-Qaeda’s tripartite threat failed both to fulfil Clinton’s political objectives, as well as succeed against the strong al-Qaeda core from 1996-2001. A stale CIA structure froze this misconception at the heart of the intelligence community, melting only with the impact of 9/11. Despite the September 11 attacks revealing al-Qaeda’s horizontal identity, the Bush and Obama administrations continued to treat it as a vertical problem. Although the intelligence community here achieved what policy required of it under both Presidents, the tactics used from 2001-2003 were inappropriate for fighting their multilateral enemy. It was not until the 2003 invasion of Iraq that these tactics evolved in line with the U.S.’s newly born comprehension of al-Qaeda’s structure. Yet Obama’s strategy mired the evolution that was needed to fully confront al-Qaeda with this reformed intelligence cycle. Furthermore, the controversial tactics adopted from 2001 serve only to reinforce the pervasive gap between the reality of al-Qaeda, and the intelligence community’s perception of it. This neglect of al-Qaeda’s ideology has only made the world more dangerous, with the rise of the Islamic State proving that the intelligence community, although successful against the al-Qaeda hard-core, has failed to fight every facet of Islamic militancy effectively.

Bibliography

Alexander, Y. and Swetnam, M. (2001). Usama bin Laden’s al-Qaida: Profile of a Terrorist Network. Ardsley: Transnational Publishers, Inc.

Al-Jezeera documentary. (2011). The 9/11 Decade: The Intelligence War. Available: https://www.youtube.com/watch?v=sSpJsV6RE9o. Last accessed 6th Nov 2014.

Al-Qaeda. Al-Qaeda Manual. Available: http://fas.org/irp/world/para/aqmanual.pdf. Last accessed 11th Nov 2014.

Barger, D. (2004). It is Time to Transform, Not Reform, US Intelligence. SAIS Review. 24 (1)

Bergen, P. and Tiedemann, K. (2010). The Drone Wars. Available: http://www.theatlantic.com/magazine/archive/2010/12/the-drone-wars/308304/. Last accessed 5th Nov 2014.

Borch, Fred L. (2003). Comparing Pearl Harbor and “9/11”: Intelligence Failure? American Unpreparedness? Military Responsibility? The Journal of Military History. 67 (3)

Burke, J. (2003). Al-Qaeda: the True Story of Radical Islam. London: Penguin books.

Bush, G. (2001). Remarks to Congress. Available: http://edition.cnn.com/2001/US/09/20/gen.bush.transcript/. Last accessed 15th Nov 2014.

Bush, G. W. (2002). Graduation speech at West Point military academy. Available: http://georgewbush-whitehouse.archives.gov/news/releases/2002/06/20020601-3.html. Last accessed 11th Nov 2014

Bush, G. W. (2002). State of the Union address. Available: http://georgewbush-whitehouse.archives.gov/news/releases/2002/01/20020129-11.html. Last accessed 11th Nov 2014

Ciluffo, F.J et al. (2002). The Use and Limits of US Intelligence. Washington Quarterly. 25
Coll, S. (2004). Ghost Wars: The Secret History of the CIA, Afghanistan and bin Laden, from the Soviet Invasion to September 10, 2001. London: Penguin books.

Danner, M. (2009). US Torture: Voices from the Black Sites. New York Review of Books. 56 (6)

Derksen, K. M. (2005). The Logistics of Actionable Intelligence Leading to 9/11. Studies in Conflict & Terrorism. 28 (3)

DeYoung, K. and Pincus W. (2009). Success Against al-Qaeda Cited .Available: http://www.washingtonpost.com/wp-dyn/content/article/2009/09/29/AR2009092903699.html. Last accessed 7th Nov 2014.

Diamond, J. (2008). The CIA and the Culture of Failure. Stanford: Stanford University Press.

Dunlap, C. (1996). How We Lost the High-Tech War of 2007. Available: http://www.weeklystandard.com/Content/Public/Articles/000/000/001/569nzbrd.asp?nopager=1. Last accessed 15th Nov 2014.

Falkenrath, Richard A. (2006). The 9/11 Commission Report: A Review Essay. International Security. 29 (3)

Foot, R. (2006). Torture: The Struggle over a Peremptory Norm in a Counter-Terrorist Era. International Relations. 20 (2)

Gunaratna, R. (2002). Inside Al Qaeda: Global Network of Terror. New York: The Berkley Publishing Group.

Jan, R. (2014). Al Qaeda Isn’t ‘On Its Heels’. Available: http://www.criticalthreats.org/alqaeda/jan-al-qaeda-isnt-on-its-heels-may-27-2014. Last accessed 7th Nov 2014.

Jordan, J. (2014). The Effectiveness of the Drone Campaign against Al Qaeda Central: A Case Study.Journal of Strategic Studies. 37 (1)

Kagan, F. (2014). Testimony: Missing the Target – Why the U.S. Has Not Defeated al Qaeda. Available: http://www.criticalthreats.org/al-qaeda/kagan-testimony-why-the-us-has-not-defeated-al-qaeda-april-08-2014. Last accessed 15th Nov 2014.

Katulis, B. and Juul, P. (2011). Destroying Al Qaeda: America’s Greatest National Security Accomplishment in Decades. Available: https://www.americanprogress.org/issues/security/news/2011/11/01/10708/destroying-al-qaeda/. Last accessed 8th Nov 2014.

Lefebvre, S. (2003). The Difficulties and Dilemmas of international intelligence Cooperation. International Journal of Intelligence and Counterintelligence. 16 (4)

Masters, J. (2013). Targeted Killings. Available: http://www.cfr.org/counterterrorism/targeted-killings/p9627. Last accessed 11th Nov 2014.

McChrystal, S. (2011). It Takes a Network. Available: http://www.foreignpolicy.com/articles/2011/02/22/it_takes_a_network. Last accessed 7th Nov 2014.

Obama, B. (2011). Remarks by the President, CIA Director Leon Panetta, and DNI Director James Clapper to the Intelligence Community at CIA Headquarters. Available: http://www.whitehouse.gov/the-press-office/2011/05/20/remarks-president-cia-director-leon-panetta-and-dni-director-james-clapp. Last accessed 19th Nov 2014.

Obama, B. (2014). President Obama Pays a Surprise Visit to Troops in Afghanistan. Available: http://www.whitehouse.gov/photos-and-video/video/2014/05/25/president-obama-pays-surprise-visit-troops-afghanistan#transcript. Last accessed 15th Nov 2014.

O’Neill, R. (2014). SEAL says in exclusive Fox News interview it was ‘just luck’ he was bin Laden shooter. Available: http://www.foxnews.com/us/2014/11/13/seal-says-in-exclusive-fox-news-interview-it-was-just-luck-was-bin-laden/. Last accessed 15th Nov 2014.

Powers, T. (2004). Intelligence Wars: American Secret History from Hitler to Al-Qaeda. United States of America: The New York Review of Books.

Presidential Daily Brief. (2001). Bin Ladin Determined To Strike in US. Available: http://fas.org/irp/cia/product/pdb080601.pdf. Last accessed 5th Nov 2014.

Richelson, J. (2002). When Kindness Fails: Assassination as a National Security Option. International Journal of Intelligence and Counterintelligence. 15 (2)

Riedel, B. (2014). Why’s Al Qaeda So Strong? Washington Has (Literally) No Idea. Available: http://www.brookings.edu/research/opinions/2014/11/09-whys-al-qaeda-strong-washington-no-idea-riedel?utm_source=Facebook&utm_medium=Social&utm_campaign=BrookingsFB11112&utm_content=BrookingsFB11112. Last accessed 19th Nov 2014.

Ross, A., Woods, C. and Leo, S. (2012). The Reaper Presidency: Obama’s 300th drone strike in Pakistan. Available: http://www.thebureauinvestigates.com/2012/12/03/the-reaper-presidency-obamas-300th-drone-strike-in-pakistan/. Last accessed 5th Nov 2014.

Schultz, R. (2003). It’s War! Fighting Post-11 September Global Terrorism Through a Doctrine of Preemption. Terrorism and Political Violence. 15 (1)

Steele, R. D. (2002). Crafting Intelligence in the Aftermath of Disaster. International Journal of Intelligence and Counterintelligence. 15 (2)

Stevenson, J. (2001/02). Pragmatic Counter-Terrorism. Survival. 43 (4)

Tenet, G. (2007). At the Center of the Storm. United States of America: HarperCollins books.

Tenet, G. J. (2000). The CIA and the Security Challenges of the New Century. International Journal of Intelligence and Counterintelligence. 13 (2)

Wolfowitz, P., (2001). Building a Military for the 21st Century. Available:http://www.globalsecurity.org/military/library/congress/2001_hr/011004wolf.pdf. Last accessed 11th Nov 2014

Wright, L. (2006). The Looming Tower: al-Qaeda’s road to 9/11. London: Allen Lane.

Yousafzai, S. (2012). Al Qaeda on the Ropes: One Fighter’s Inside Story. Available: http://www.newsweek.com/al-qaeda-ropes-one-fighters-inside-story-64229. Last accessed 14th Nov 2014.

Zegart, A. (2007). “CNN with Secrets”: 9/11, the CIA and the Organizational Roots of Failure.International Journal of Intelligence and Counterintelligence. 20 (1)

Zelikow, P. et. al. (2004). The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States. Washington: U.S. Government Printing Office

Zenko, M. and Fellow, D. (2013). Transferring CIA Drone Strikes to the Pentagon. Available: http://www.cfr.org/drones/transferring-cia-drone-strikes-pentagon/p30434. Last accessed 5th Nov 2014.

Zimmerman, K. (2014). A New Definition for Al-Qaeda. Available: http://www.criticalthreats.org/al-qaeda/zimmerman-a-new-definition-for-al-qaeda-january-31-2014. Last accessed 15th Nov 2014.
___________________________________________


THIS CONTENT WAS WRITTEN BY A STUDENT AND ASSESSED AS PART OF A UNIVERSITY DEGREE AND ORIGINALLY PUBLISHED AT E-IR , Under Creative Commons License.
Name

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,11,Accidents,22,Activism,1,Adani Group,6,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,36,Aerospace,5,Afghanistan,88,Africa,115,Agile Methodology,2,Agriculture,21,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,6,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,31,Army,3,Art,3,Artificial Intelligence,84,Artillery,2,Arunachal Pradesh,2,ASEAN,13,Asia,71,Asia Pacific,24,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,58,Austria,1,Automation,13,Automotive,133,Autonomous Flight,2,Autonomous Vehicle,4,Aviation,63,AWACS,2,Awards,17,Azerbaijan,17,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Bali,1,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,30,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,21,BIMSTEC,1,Biodiversity,1,Biography,1,Biology,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,11,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,33,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,7,Bomb,3,Bond Market,3,Book,11,Book Review,24,Border Conflicts,13,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,107,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,5,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1271,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,58,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Banks,1,Central Eastern Europe,49,Certification,1,Chad,2,Chagos Archipelago,1,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Chemistry,1,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,599,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,6,Climate,68,Climate Change,29,Climate Finance,2,Climate Studies,1,Clinical Research,3,Clinton,1,Cloud Computing,46,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,16,Commodities,5,Communication,13,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,2,Conflict,117,Conflict Diamonds,1,Conflict Resolution,49,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,3,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,5,Credit,2,Credit Rating,3,Credit Score,1,Crimea,4,Critical Minerals,1,CRM,1,Croatia,2,Crypto Currency,21,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,9,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,10,Cyber Crime,2,Cyber Security & Warfare,118,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,5,DACA,1,Dagestan,1,DARPA,3,Data,9,Data Analytics,36,Data Center,4,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Debt Fund,1,Decision Support System,5,Defense,12,Defense Deals,8,Deflation,1,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,3,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,5,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,54,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,2,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Indicator,1,Economic Justice,1,Economics,46,Economy,115,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,61,Education,67,EFTA,1,Egypt,28,Election Disinformation,1,Elections,54,Electric Vehicle,15,Electricity,7,Electronics,9,Emerging Markets,1,Employment,23,Energy,317,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,9,Entrepreneurship,15,Environment,47,ePayments,14,Epidemic,6,ESA,1,Ethiopia,4,Eulogy,4,Eurasia,3,Euro,6,Europe,15,European Union,237,EuroZone,5,Exchange-traded Funds,2,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,6,Featured,1432,Federal Reserve,6,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,19,Financial Markets,60,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,15,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,37,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,French Polynesia,1,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,23,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gambling,1,Gaming,1,Garissa Attack,1,Gas Price,24,GATT,1,Gaza,16,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,9,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,11,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,72,Ghana,3,Gibratar,1,Gig economy,1,Glaciology,1,Global Markets,1,Global Perception,1,Global Trade,101,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,5,Google,20,Gorkhaland,1,Government,129,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,185,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,2,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,5,Haiti,2,Hamas,12,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,17,Houthi,13,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,77,Immigration,21,Impeachment,1,Imran Khan,1,Independent Media,73,India,692,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,28,Indian Ocean,25,Indices,1,Indigenous rights,1,Indo-Pacific,9,Indonesia,25,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,4,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,213,Iraq,54,IRGC,1,Iron & Steel,5,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,154,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,95,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Julian Assange,1,Justice System,3,Kamala Harris,3,Kanchin,1,Kashmir,10,Kaspersky,1,Kazakhstan,26,Kenya,6,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Ladakh,1,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,84,Law,6,Leadership,3,Lebanon,12,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,2,Light Battle Tank,1,Linkedin,1,Lithium,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,11,Lockdown,1,Lone Wolf Attacks,3,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,51,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,30,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,3,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,19,Meta,3,Metadata,2,Metals,4,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,113,Military Exercise,12,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,57,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,2,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,4,NASA,14,NASDAQ,1,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Aviation,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,13,Netflix,1,Neurosciences,7,New Caledonia,1,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1327,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Noble Prize,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,55,North Korea,60,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,7,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,2,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,388,Oil Gas,7,Oil Price,77,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,130,Open Access,1,Open Journal Systems,2,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,709,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,183,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,27,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Payment Orchestration,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,6,Petrochemicals,1,Petroleum,19,Pharmaceuticals,15,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,6,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,56,Polynesia,3,Pope,1,Population,7,Portugal,1,Poverty,8,Power Transmission,6,Preprint,1,President APJ Abdul Kalam,2,Presidential Election,35,Press Release,158,Prison System,1,Privacy,18,Private Debt Fund,1,Private Equity,3,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,14,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,8,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,7,Recall,4,Recession,2,Red Sea,6,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,53,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Revenue-based Financing,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,3,Royal Canadian Air Force,1,Rupee,1,Russia,327,Russian Navy,6,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,407,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,4,Securities,2,Security,6,Semiconductor,21,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,3,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Sociology,1,Soft Power,1,Software,8,Software Engineering,1,Solar Energy,17,Somalia,5,South Africa,20,South America,55,South Asia,496,South China Sea,36,South East Asia,84,South Korea,66,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,47,Space Station,3,Spaceflight,1,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,25,Stablecoin,1,Stamps,1,Startups,43,State,1,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,29,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,6,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,34,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,5,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,78,Testing,2,Texas,3,Thailand,12,The Middle East,664,Think Tank,317,Tibet,3,TikTok,2,Tim Walz,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,22,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,16,Tsar,1,Tunisia,7,Turkey,75,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,116,Ukraine War,29,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,86,United Nations,29,United States,787,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US Dollar,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,22,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,26,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,18,Water Politics,8,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,2,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,39,World Economy,33,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,29,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: THE PAPER | U.S. Intelligence Community's Performance Against al-Qaeda Since 1988
THE PAPER | U.S. Intelligence Community's Performance Against al-Qaeda Since 1988
This paper will begin by defining al-Qaeda as a tripartite entity consisting of a hard-core, a network, and an ideology. In three chronological sections, this reality will be compared with the American intelligence community’s perception of, and performance against, al-Qaeda during each time frame, so as to evaluate the success of American intelligence in the war on terror.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0G3ExmB2949oyXCgK6uKniJ6l68zokyXD0pBKUnhpRMLSIPRCSNpjP39IkZ7AEWVrD564MPUt_N4Xx9ga1DScY2kOIyIZiSRys2Av-s9VITe4FH33tHsZsYTopittXjC-3ZMnt4kizM/s640/Nov+20154-001.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEge0G3ExmB2949oyXCgK6uKniJ6l68zokyXD0pBKUnhpRMLSIPRCSNpjP39IkZ7AEWVrD564MPUt_N4Xx9ga1DScY2kOIyIZiSRys2Av-s9VITe4FH33tHsZsYTopittXjC-3ZMnt4kizM/s72-c/Nov+20154-001.jpg
IndraStra Global
https://www.indrastra.com/2015/12/PAPER-US-Intelligence-Communitys-Performance-Against-al-Qaeda-Since-1988-0503.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2015/12/PAPER-US-Intelligence-Communitys-Performance-Against-al-Qaeda-Since-1988-0503.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content