Counterstrike: The Untold Story of America's Secret Campaign Against Al Qaeda (44 page)

Read Counterstrike: The Untold Story of America's Secret Campaign Against Al Qaeda Online

Authors: Eric Schmitt,Thom Shanker

Tags: #General, #Military, #History, #bought-and-paid-for, #United States, #21st Century, #Political Science, #Terrorism, #War on Terrorism; 2001-2009, #Prevention, #Qaida (Organization), #Security (National & International), #United States - Military Policy - 21st Century, #Intelligence & Espionage, #Terrorism - United States - Prevention

Afghanistan and

attacks in Europe and North America

Bhutto assassination and

bounties on

Bush and

dual-track strategy vs.

female suicide bombers and

finances and

future of

Germany and

Horn of Africa and

ideological war and

intelligence analysis on

Internet and

Iraq and

kill-or-capture tactics vs.

Mali and

Muslim rifts and

networks of

new deterrence vs.

9/11 and early fight vs.

Obama and

Pakistan and

pre-9/11 attacks by

recruitment by

recruitment of Americans by

Saudi Arabia and

structure and affiliates of

Tora Bora gathering of 2007 and

WMD and

Al Qaeda in Iraq

Al Qaeda in Mesopotamia

Al Qaeda in Pakistan

Al Qaeda in the Arabian Peninsula (AQAP)

Al Qaeda media emirs

al-Shabab terror cell

American Airlines Flight 11

American Airlines Flight 77

American Israel Public Affairs Committee (AIPAC)

Americans

electronic surveillance of

radicalization and terrorist acts of

resilience of

ammonium nitrate

Anaconda, Operation

Anbar Province

Ansar al-Islam

Arab-Israeli conflict

Arms and Influence
(Schelling)

Ashcroft, John

Asheik, Grand Mufti Sheik Abdul Aziz

Aufhauser, David

Aum Shinrikyo cult

Awlaki, Anwar al-

B-2 bombers

B-52 bombers

Baath Party

Badri, Haythem Sabah Shaker Mahmud al-

Baghdad, Battle of (2007)

Bahrain

Balawi, Humam Khalil Abu-Mulal al-

Baltimore bomb plot (2010)

Barrett, Richard

Beers, Charlotte

Beers, Rand

Beirut truck bombings (1983)

Benjamin, Daniel

“Bernie” (Saudi militant)

Bhutto, Benazir

bin Laden, Khalid

bin Laden, Osama

Abbottabad raid and killing of

Afghanistan war and

AQAP and

Bush and

Muslim uprisings of 2011 and

Obama and

Pakistan floods and

Tora Bora and

Two + Seven plan and

bin Laden, Saad

Bipartisan Policy Center

Black Hawk Down incident

Blair, Dennis

Bojinka plot of 1995

Bosnia

Boykin, William G.

Brachman, Jarret

Brennan, John

Breyer, Stephen

Brodie, Bernard

Brooklyn Bridge plot of 2003

Browne, Paul J.

Bush, George W.

Al Qaeda and

cyberwarfare and

ExOrds and

homegrown terrorism and

ideological battle and

Iraq and

new deterrence and

9/11 and

NSS of 2002 and

Obama strategy vs.

Pakistan and

telephone intercepts and

terrorist financing and

Tora Bora and

Two + Seven plan and

war on terror and

Cambone, Stephen

Campbell, John

Camp Cropper

Camp Lemonier

Camp Nama

Cartwright, James E.

Casablanca bombings of 2003

CAUI (countering adversary use of the Internet)

CBRN (chemical, biological, radiological, or nuclear weapons)

CBS News

cell phones

Centcom Four Web sites

Center for Strategic and Budgetary Assessments

Center for Strategic and International Studies (CSIS)

Center for Strategic Counterterrorism Communications

Central Command

Central Intelligence Agency (CIA)

Abbottabad raid and

Abu Zubaydah and

Afghanistan and

bin Laden and

Chapman ambush and

Counterterrorism Security Group and

cyberwarfare and

DIA vs.

FBI and

homegrown terrorism and

Iraq and

9/11 and

Pakistan and

Pentagon and

Philippines and

public diplomacy and

Saudis and

Sinjar intelligence and

Two + Seven plan and

Yemen and

Chalus, Iran, operation

Chapman Forward Operating Base

Charlie Wilson’s War
(book and film)

Chaudhry, Iftikhar Muhammad

Chechnya

Cheney, Dick

Chertoff, Michael

Chicago Tribune

Chilton, Kevin P.

China

Christmas Day underwear bomber (2009)

civil liberties

Clarke, Richard A.

Clinton, Bill

Clinton, Hillary Rodham

CNN (TV network)

Cold War

Cole
attack

Colombia

Combined Air Operations Center (CAOC)

Combined Joint Special Operations Task Force—Philippines

Combined Joint Task Force—Horn of Africa

Commerce Department

computer gaming

computer networks

“Concept for Deterring and Dissuading Terrorist Networks, A” (briefing)

cost-benefit analysis

Coultrup, Bill

Council of Senior Ulema

countermessaging campaign

counterradicalization programs

Counterterrorism Security Group

counterterrorism.
See also
Al Qaeda; new deterrence;
and specific actions, agencies, individuals, military and intelligence units, nations, and organizations

Abbottabad raid and

Americans’ need to understand

AQAP plot of 2010 and

battlefield intelligence and

blurred line between soldiers and spies in

Bush and

CAOC and

coordination of

cyberwarfare and

early post-9/11

evolution of

federal spending on

female suicide bomber program

future of

homegrown terrorism and

homeland preparedness

Horn of Africa and

ideological battle and

intelligence sharing and

new deterrence as part of

new doctrines and units for

new thinking emerges on

Obama and

official review of 2011

Pakistan and

Philippines and

public diplomacy and

regions with greatest risk

soft power and

Strategic Planning Cell and

strikes vs. propaganda and

supercomputers and

Crumpton, Henry A.

Cummings, Arthur M., II

Custer, George Armstrong

cybercenters

Cyber Command

cyberwarfare

Dailey, Dell L.

Dallas bomb plot of 2009

Davis, Jim

Davis, Michele

Davis, Raymond

Defense Department (Pentagon)

Defense Human Intelligence Service

Defense Intelligence Agency (DIA)

Defense Policy Board

Defense Senior Leadership Conference (DSLC)

defense spending

democracy

Denmark

deradicalization centers

Desert One Operation

deterrence.
See
new deterrence

Diego Garcia

Digital Engagement Teams

digital outreach teams

disruption strategy

Distributed Common Ground System-1

Djerejian, Edward P.

Djibouti mission

Douri, Izzat Ibraham al-

“Doves of Peace” radio show

Drug Enforcement Administration

E-6B “Prowler” planes

Education Department

education programs

Egypt

electronic surveillance

Ellipse Charlie exercise

e-mail

Energy Department

“enhanced” or harsh techniques

Enigma codes

Erbil women’s conference

Eritrea

Ethiopia

Europe

European Command

Execute Orders (ExOrds)

explosives

Facebook

Fallon, William

Fallujah offensive of 2004

false band replacement

FARC

Faris, Iyman

Other books

Furious Old Women by Bruce, Leo
Aftermath by Dee, Cara
A Stranger in the Kingdom by Howard Frank Mosher
Surrender Becomes Her by Shirlee Busbee
Only You by Cheryl Holt
My Second Death by Lydia Cooper