“AT&T gives DEA 26 years of phone call records to wage war on drugs” http://feedly.com/k/139yDpJ
A number of techniques have surfaced over the years making security researchs concerned about TORs ability to protect users.
“Snoops can identify Tor users given enough time, experts say” http://feedly.com/k/1cLSrSR
While assassination or targeting of leadership may not be effective and degrading networks delegitimizing various lineages, ie relationships and communications, is historically veey effective.
Network analysis software developed by the DoD and IC have been used to analyze gangs and criminal networks by LE for some years. Especially in fusion cells. With DoD dollars slowing down though big vendors are looking for new customers and large metropolitan departments may start deploying the same systems as their federal counterparts.
“How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA” http://www.technologyreview.com/view/516701/how-military-counterinsurgency-software-is-being-adapted-to-tackle-gang-violence-in/