Aid, Matthew M. Intel Wars: The Secret History of the Fight Against Terror. New York and London: Bloomsbury Press, 2012.
To Nolan, IJI&C 25.4 (Winter 2012-2013), the author "provides a well-researched look at ... the intelligence war within the war and its major players." This work "presents a contemporary blueprint to which more details can later be added."
Dilanian, Los Angeles Times, 2 Jan 2012, finds that this book is full of "revelatory anecdotes.... Weaving together information from once-secret State Department cables disclosed by Wikileaks, little-noticed military documents and the author's own interviews with current and former officials, 'Intel Wars' delves into some of the recent successes, failures and contradictions of the covert war against Al Qaeda in Afghanistan, Pakistan, Yemen and Somalia." However, "Aid might have done more to knit his fabulous reporting together thematically; the book can be a bit disjointed in spots."
For Temple-Raston, Washington Post, 17 Feb. 2012, "[e]very chapter in the book is braided with intelligence nuggets.... The book's chapters on Afghanistan and Pakistan are particularly engrossing, although they don't put the intelligence community in a particularly good light.... As enjoyable as the book is, it has shortcomings. It can be a little scattered and often reads like a series of articles cobbled together rather than a cohesive whole. And there are some factual errors." Nevertheless, this is a "highly entertaining and interesting book that provides a full-color, detailed snapshot of how the Obama administration is using intelligence to battle terrorism."
Belasco, Amy. The Cost of Iraq, Afghanistan, and Other Global War on Terror Operations Since 9/11. Washington, DC: Congressional Research Service, Library of Congress, 29 Mar. 2011. Available at: http://www.fas.org/sgp/crs/natsec/RL33110.pdf.
"Between FY2009 and FY2010, average monthly DOD spending for Afghanistan grew from $4.4 billion to $6.7 billion a month,... while average troop strength almost doubled from 44,000 to 84,000 as part of the troop surge announced by the President last year. Troop strength in Afghanistan is expected to average 102,000 in FY2011. DOD's plans call for troop levels to fall by less than 4,000 in FY2012 unless the President decides otherwise.... It is currently unclear how quickly or slowly troop levels will fall this summer or in later years."
Bronskill, Jim. "Canadian Agency Tracks Money Given to Islamic Militants." Canadian Press, 19 Oct. 2014. [http://www.thestar.com]
According to Director Gerald Cossette, Canada's financial intelligence agency, the Financial Transactions and Reports Analysis Centre of Canada (FinTRAC), "is actively helping police and spies follow the money flowing into the coffers of Islamic extremists fighting overseas.... The centre zeroes in on cash linked to terrorism, money laundering and other crimes by sifting through data from banks, insurance companies, securities dealers, money service businesses, real estate brokers, casinos and others."
Builta, Jeffrey A., and Eric N. Heller. "Reflections on 10 Years of Counterterrorism Analysis." Studies in Intelligence 55, no. 3 (Sep. 2011): 1-12.
Over the past 10 years, the U.S. Counterterrorism (CT) community "has restructured and implemented new processes to optimize the CT effort." However, the authors' experiences suggest that "the group of issues" discussed in this article "will endure as the prime drivers of effectiveness in the CT community."
Courtney, Peter C. "To Render or Intern: Counterterrorism Methods of the FBI SIS and CIA." International Journal of Intelligence and Counterintelligence 26, no. 3 (Fall 2013): 482-506.
The author argues that "legal constraints exist in the pursuit of third country rendition, excessive interrogation, and relying on the Alien Enemy Act as a legal grounding; these should be avoided in seeking a legal counterterrorism operation."
Dahl, Erik J. Intelligence and Surprise Attack: Failure and Success from Pearl Harbor to 9/11 and Beyond. Washington, DC: Georgetown University Press, 2013,
Brooks, Proceedings 139.12 (Dec. 2013), finds that much of this work examines "cases of terrorist-related warning failures as well as 227 cases where terrorist attcks were successfully twarted.... [N]o other scholarly work has attempted this sort of comparison of why warning worked in some cases and did not in others." This is "a well-written and thought-provoking book that provides well-researched analysis of what makes warning intelligence work."
DeYoung, Karen. "A CIA Veteran Transforms U.S. Counterterrorism Policy." Washington Post, 24 Oct. 2012. [http://www.washingtonpost.com]
In an interview at the end of August 2012, presidential counterterrorism adviser John O. Brennan explained how he is working on "the administration's evolving procedures for the targeted killings that have come to define its fight against al-Qaeda and its affiliates. It will cover the selection and approval of targets from the 'disposition matrix,' the designation of who should pull the trigger when a killing is warranted, and the legal authorities the administration thinks sanction its actions in Pakistan, Yemen, Somalia and beyond.... A burly 25-year CIA veteran..., Brennan is the principal architect of a policy that has transformed counterterrorism from a conventional fight centered in Afghanistan to a high-tech global effort to track down and eliminate perceived enemies one by one."
Elias-Sanborn, Barbara, ed. The Central Intelligence Agency's 9/11 File: Top Secret CIA Documents on Osama bin Laden Declassified. National Security Archive Electronic Briefing Book No. 381. Washington, DC: National Security Archive, 19 Jun. 2012. [http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB381/]
The National Security Archive on 19 June 2012 posted "over 100 recently released CIA documents relating to September 11, Osama bin Laden, and U.S. counterterrorism operations." The documents, obtained by the Archive "under the Freedom of Information Act, are referred to in footnotes to the 9/11 Commission Report. The collection includes rarely released CIA emails, raw intelligence cables, analytical summaries, high-level briefing materials, and comprehensive counterterrorism reports."
Hannigan, Robert. "The Web Is a Terrorist's Command-and-Control Network of Choice." Financial Times, 3 Nov. 2014. [http://www.ft.com]
Hannigan is Director of GCHQ. ISIS "is the first terrorist group whose members have grown up on the internet. They are exploiting the power of the web to create a jihadi threat with near-global reach. The challenge to governments and their intelligence agencies is huge -- and it can only be met with greater co-operation from technology companies."
Jones, Seth G. Hunting in the Shadows: The Pursuit of Al Qa'ida Since 9/11. New York: Norton, 2012.
Peake, Studies 56.4 (Dec. 2012) and Intelligencer 19.3 (Winter-Spring 2013), notes that this "fine well-documented" work "treats the US and UK reactions to 9/11." The author's "style makes for an easy read, and he does more than just provide facts," adding "geographic, societal, and political" background to his discussion.
Return to Terrorism 2010s Table of Contents