We worked to develop our own operations to advance U.S. counterterrorism objectives by penetrating terrorist safe havens and collecting intelligence that would inform policy and enable our own operations.
They went back there looked at all the computers asked me to come in and tell them what all the computers were for specifically so they knew how to dismantle the network I had been running.