• Complain

Mark Bowden - The Finish

Here you can read online Mark Bowden - The Finish full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: New York, year: 2012, publisher: Atlantic Monthly Press, genre: Non-fiction. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Mark Bowden The Finish
  • Book:
    The Finish
  • Author:
  • Publisher:
    Atlantic Monthly Press
  • Genre:
  • Year:
    2012
  • City:
    New York
  • ISBN:
    978-0-8021-9410-7
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

The Finish: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Finish" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

From Mark Bowden, the preeminent chronicler of our military and special forces, comes , a gripping account of the hunt for Osama bin Laden. With access to key sources, Bowden takes us inside the rooms where decisions were made and on the ground where the action unfolded. After masterminding the attacks of September 11, 2001, Osama bin Laden managed to vanish. Over the next ten years, as Bowden shows, America found that its war with al Qaedaa scattered group of individuals who were almost impossible to trackdemanded an innovative approach. Step by step, Bowden describes the development of a new tactical strategy to fight this warthe fusion of intel from various agencies and on-the-ground special ops. After thousands of special forces missions in Iraq and Afghanistan, the right weapon to go after bin Laden had finally evolved. By Spring 2011, intelligence pointed to a compound in Abbottabad; it was estimated that there was a 50/50 chance that Osama was there. Bowden shows how three strategies were mooted: a drone strike, a precision bombing, or an assault by Navy SEALs. In the end, the President had to make the final decision. It was time for the finish.

Mark Bowden: author's other books


Who wrote The Finish? Find out the surname, the name of the author of the book and a list of all author's works by series.

The Finish — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Finish" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Mark Bowden

THE FINISH

The Killing of Osama bin Laden

For Clara and Audrey

Human groupings have one main purpose: to assert everyones right to be different, to be special, to think, to feel and live in his or her own way. People join together in order to win or defend this right. But this is where a terrible, fateful error is born: the belief that these groupings in the name of a race, a God, a party, or a state are the very purpose of life and not simply a means to an end. No! The only true and lasting meaning of the struggle for life lies in the individual, in his modest peculiarities and in his right to these peculiarities.

Vasily Grossman, Life and Fate

The properties of a movement are spontaneity, impulsiveness, dynamic expansivenessand a short life. The properties of a structure are inertia, resilience, and an amazing, almost instinctive, ability to survive.

Ryszard Kapuscinski, Shah of Shahs

Prologue

20072008

One fall night in western Iraq, as a unit from the U.S. Joint Special Operations Command (JSOC) was executing one of its nightly raids on suspected al Qaeda terrorists, this one a suspected regional commander who called himself Muthanna, the raiders inadvertently discovered the mother lode.

In another war in a different time, the mother lode might have been a huge cache of valuable weapons or a collection of battlefield maps showing enemy troop movements and positions. In the twenty-first century, the raiders of JSOC had discovered something of equivalent value: a Rolodex.

Muthanna was killed in the raid. It was clear from material seized at his residence that he was responsible for coordinating the movement of foreign al Qaeda fighters and potential suicide bombers across the nearby border with Syria and into Iraq, where American and Iraqi forces, and Iraqi civilians, were enduring a mounting campaign of mass slaughter. What they found was not an actual Rolodex; it was something better: a collection of names and numbers that referenced computer files containing names, photos, travel documents, expense reports for phone cards, clothing, vehicles, fuel, money transfers, and many other detailed documents for about five hundred current al Qaeda recruitsjust about every mujahidin who had made the trek in recent years through Syria and into Iraq.

For centuries, the basic tactics of infantry warfare were fire and maneuver. A skilled officer could defeat a larger force by mastering the art of moving his men and effectively focusing their firepower. Those kinds of skills are still essential on a conventional battlefield, but the battles being fought today rarely boil down to armies maneuvering on the ground. Information and intelligence is the fire and maneuver of the twenty-first century, says Lt. Gen. Michael Flynn, who now heads the U.S. Defense Intelligence Agency.

What does he mean?

The mother lode of documents seized in what became known as the Sinjar raid illustrates the point nicely. It played a big part in decapitating al Qaeda in Iraq. In the six years after the 9/11 attacks, the U.S. military and intelligence communities, representing a wide variety of agencies large and small, those notorious and those secret, had been collaborating on an unprecedented capability for crushing furtive terrorist networks. In addition to the skills of JSOCs talented special operators, the effort used supercomputers and custom software, the forward deployment of skilled analysts, and the ability to turn just about every kind of intel into searchable data, whether tips or documents from old-fashioned human spy networks, transcripts of detainee interrogations, logs of electronic surveillance monitoring communications between cell phones and computers, or the images and sensory readings gathered by drones hovering high and silent over potential targets for days, weeks, months, and even years. With an enormous database consisting of these fragments, few of them clearly related, computers are capable of finding links that would previously remain hiddena bank account shared by a Hezbollah official and an al Qaeda recruit, a street address in Najaf visited by two known suicide bombers on two separate occasions, a snapshot from the wallet of a slain American soldier on the hard drive of a suspected terrorist paymaster. The computer instantly draws bloody threads between data points that would otherwise remain random and disconnected. Webs are drawn from these bloody threads, illuminating secret networks. Once such connections are made, the special operators know where and whom to hit next.

In the case of the Sinjar haul, JSOC Commander Stanley McChrystal took the surprising step of declassifying all of the material and turning it over to West Points Combating Terrorism Center, so that analysts from a variety of disciplines could take a crack at it. And what did they uncover? For one thing, the data exploded the propaganda claim that al Qaeda in Iraq was a homegrown resistance movement. The recruits in the Sinjar data came from Libya, Morocco, Syria, Algeria, Oman, Yemen, Tunisia, Egypt, Jordan, Saudi Arabia, Belgium, France, and the UK. American Treasury agents mapping the datas financial transactions were able to identify the entire Syrian-based leadership of al Qaeda in Iraqs foreign-support network, all of it under the direction of a man who called himself Abu Ghadiya. His real name was Badran Turki Hashim al-Mazidih.

Just over one year after the Sinjar raid, the entire senior leadership of this Syrian-based support network for al Qaeda had been destroyed. A single October 2008 raid inside Syria killed Abu Ghadiya, one of his brothers, and two cousins, all members of the top leadership. The database would also provide a road map for JSOC operations throughout Iraq, tracking down and capturing or killing those foreign recruits who had not already sacrificed themselves in suicide attacks.

By the end of 2008, the overall level of violence in Iraq had declined by 80 percent, according to the U.S. Department of Defense. This sharp trend has continued through the withdrawal of U.S. forces from that country in 2011, and remains lower today than at any time since before the American invasion in 2003.

There are multiple reasons for this striking turnabout. The Sunni Awakening in 2008 turned many Iraqi insurgents against al Qaedaabetted at least to some extent by the Sinjar data analysis, reported in the summer of 2008, which revealed the foreign-born nature of the organization. The dramatic shift in strategy orchestrated by Gen. David Petraeus toward counterinsurgency tactics during the same period deserves much of the credit. But a large part of Petraeuss own approach included ramping up the pressure on irreconcilable elements. As he put it, I like to go to bed every night with more friends and with fewer enemies.

JSOC provided the fewer enemies, and McChrystal has cited the Sinjar raid as one of his units most important breakthroughs.

Prevailing in war often demands new tactics, methods, and tools. The attacks on America on September 11, 2001, challenged a long-standing premise of its national defense. Osama bin Laden and his extremist movement, al Qaeda, posed a new kind of threat, a global network of well-funded, clever, suicidal killers with no fixed address. The nations vast arsenal, its nuclear stockpiles, its incomparable air force, its army and navy, even its bureaucratic structure for global surveillance, spying, and intel analysis, was designed primarily to deter attack. Who would dare when the response would be swift, fatal, and unstoppable?

But what if attacks came from nowhere? What then?

This was the problem posed by 9/11. The answer was information. Finding the enemy has long been one of the most basic challenges of war. All al Qaeda did was up the level of difficulty. They lived and worked scattered all over the world, using global telecommunications to stay linked. Given the complexity and international nature of those links, the use of pseudonyms and all the tricks of spy craft, how was this new enemy ever to be found?

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Finish»

Look at similar books to The Finish. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Finish»

Discussion, reviews of the book The Finish and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.