May 6, 2011:
The recent raid on Osama bin Laden's hideout in Pakistan yielded, as expected, a massive amount of data. Anyone with any connection to al Qaeda, and particularly bin Laden, knew what that meant. In short, you had better run, and stay away from anyone else so connected, until the aftereffects of all this damaging data have run its course. This is all because of what happened in Iraq. Most Americans are not aware of this intelligence angle, but the word has gotten around in terrorist circles.
It works like this. In the last five years, counter-terror operations in Iraq were increasingly concentrating on chasing down specific terrorists and their organizations. The amount of intelligence residing in databases, plus the daily flow of new information made it possible to track terrorist cells and chase after them with high confidence that they would be caught. There were a lot of Islamic terrorists out there in Iraq, but by 2007 they had to spend most of their time on OpSec (operational security, making sure that they, or their bomb making workshops, are not discovered.)
For years, every night in Iraq, about a dozen known bad guys were hauled in. Some of these men gave up their buddies, or incriminating documents or other evidence (often fingerprints) would do it. Since about 2005, U.S. troops were fingerprinting every suspicious character they came across. The guy they turned loose several years earlier for lack of evidence, may end up on a wanted list today because his prints were now found all over some warm weapons or bomb making materials. Prints can even be lifted off some fragments of exploded bombs.
The army and marines have been doing the same thing police forces and corporations have been doing for over a decade; taking data from many different sources and quickly sorting out what all the pieces mean. It's called fusion and data mining, and it's a weapon that is having a dramatic impact on what many thought was an unwinnable war.
The final factor in this trend was the parallel growth of raiding and command techniques. American troops developed organizations, equipment and tactics that enabled them to rapidly and safely (for both the raiders and the arrested) go after suspects in dense residential areas (or farms in rural areas). You didn't hear much about this, because these raids did not generate casualties or the kind of violence that grabs headlines. American commanders and headquarters also learned how to plan and execute these raids very quickly (sometimes within minutes of new information being discovered.) This meant that, after a terrorist hideout was raided, information found there could generate additional raids in less than an hour. The new raids often caught terrorists who had not yet heard of the earlier raid that turned up the data putting them on the American radar. Speed was a weapon, and it took years to develop a superior amount of it.
The same techniques were applied in Afghanistan, and to the war on terror in general. Thus seizing all that data in bin Laden's house provided thousands of links, and data on who did what for who and when. Added to existing data, and using the specialized software and databases, will provide sufficient information to launch more raids. They are probably already underway. But you won't hear about it until somewhat later, because more valuable information, and suspects, will be picked up and lead to still more raids. After weeks, or months, the names of "most wanted" suspects that were arrested or killed will get out. But the big damage is done to the organization of these terrorist groups, and the confidence they once had in their communications, and the people they once trusted.