4,963
Views
16
CrossRef citations to date
0
Altmetric
Original Articles

The Effectiveness of the Drone Campaign against Al Qaeda Central: A Case Study

Bibliography

  • ‘The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States’, 22 July 2004. Washington DC: US Government Printing Office.
  • Aid, Mathew, Intel Wars: The Secret History of the Fight against Terror (New York: Bloomsbury P 2012).
  • Bass, Bernard M., ‘Two Decades of Research and Development in Transformational Leadership’, European Journal of Work and Organizational Psychology 8/1 (1999), 9–32.
  • BBC News, ‘Profile: Key US terror suspects’ 11 Feb. 2008.
  • Bergen, Peter L., ‘Afghanistan and Pakistan: Understanding a Complex Threat Environment’, Testimony before the House of Representatives, Oversight and Government Reform Committee, 4 Mar. 2009.
  • Brooks, Risa A., ‘Muslim “Homegrown” Terrorism in the United States: How Serious is the Threat?’, International Security 36/2 (2011), 7–47.
  • Byman, Daniel L., ‘Do Targeted Killings Work?’, Foreign Affairs 85/2 (2006), 95–112.
  • Carvin, Stephanie, ‘The Trouble with Targeted Killing’, Security Studies 21/3 (2012), 529–55.
  • Collins, Liam, ‘The Abbottabad Documents: Bin Ladin’s Security Measures’, CTC Sentinel 5/5 ( May 2012), 1–4.
  • Cronin, Audrey Kurth, How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns (Princeton: Princeton UP 2009).
  • Cruickshank, Paul, ‘The 2008 Belgium Cell and FATA’s Terrorist Pipeline’, CTC Sentinel 2/4 (2009), 4–8.
  • Cruickshank, Paul, ‘Investigations shed new light on Toulouse terrorist shootings’, CNN, 13 June 2012.
  • Dahl, Erik J., ‘The Plots that Failed: Intelligence Lessons Learned from Unsuccessful Terrorist Attacks against the United States’, Studies in Conflict and Terrorism 34/8 (2011), 621–48.
  • Eilstrup-Sangiovanni, Mette and Calvert Jones, ‘Assessing the Dangers of Illicit Networks: Why Al-Qaida May be Less Threatening than Many Think’, International Security 33/2 (2008), 7–44.
  • Europol, ‘TE-SAT EU Terrorism and Trend Report’, <https://www.europol.europa.eu/latest_publications/37>.
  • Gardham, Duncan, ‘“Suicide bomb plotter” told wife it was best they split up’, Telegraph, 16 Nov. 2011.
  • Georgy, Michael and Saud Mehsud, ‘Al Qaeda Down, but Not Out in Pakistan’, Reuters, 10 June 2012.
  • Gunaratna, Rohan, Inside Al Qaeda: Global Network of Terror (New York: Columbia UP 2002), 7–8.
  • Gunaratna, Rohan and Aviv Oreg, ‘Al Qaeda’s Organizational Structure and its Evolution’, Studies in Conflict and Terrorism 33/12 (2010), 1043–78.
  • Hafez, Mohammed M. and Joseph M. Hatfield, ‘Do Targeted Assassinations Work? A Multivariate Analysis of Israel’s Controversial Tactic during the Al Aqsa Uprising’, Studies in Conflict and Terrorism 29/4 (2006), 359–82.
  • Heger, Lindsay, Danielle Jung and Wendy H. Wung, ‘Organizing for Resistance: How Group Structure Impacts the Character of Violence’, Terrorism and Political Violence 24/5 (2012), 743–68.
  • Hoffman, Bruce, ‘The Myth of Grass-Roots Terrorism’, Foreign Affairs 87/3 (2008), 133–8.
  • Hoffman, Bruce, ‘Radicalization and Subversion: Al Qaeda and the 7 July 2005 Bombings and the 2006 Airline Bombing Plot’, Studies in Conflict and Terrorism 32/12 (2009), 1100–16.
  • Human Rights Clinic, Counting Drone Strike Deaths (New York: Columbia Law School 2012).
  • Inkster, Nigel, Afghanistan: To 2015 and Beyond (London: The International Institute for Strategic Studies 2011), 141–66.
  • Jackson, Brian A. and David R. Frelinger, ‘Rifling Through the Terrorists’ Arsenal: Exploring Groups’ Weapon Choices and Technology Strategies’, Studies in Conflict and Terrorism 31/7 (2008), 583–604.
  • Jenkins, Brian M., Will Terrorists Go Nuclear? (Santa Monica: RAND 1975).
  • Jones, Seth, Hunting in the Shadows: The Pursuit of Al Qa’ida Since 9/11 (New York: W.W. Norton 2012).
  • Johnston, Patrick B., ‘Does Decapitation Work? Assessing the Effectiveness of Leadership Targeting in Counterinsurgency Campaigns’, International Security 36/4 (2012), 47–79.
  • Jordan, Javier, ‘Analysis of Jihadi Terrorism Incidents in Western Europe, 2001–2010’, Studies in Conflict and Terrorism 35/5 (2012), 382–404.
  • Jordan, Jenna, ‘When Heads Roll: Assessing the Effectiveness of Leadership Decapitation’, Security Studies 18/4 (2009), 719–55.
  • Jung, Dongil Don, Anne Wu and Chee W. Chow, ‘Towards Understanding the Direct and Indirect Effects of CEOs’ Transformational Leadership on Firm Innovation’, Leadership Quarterly 19/5 (2008), 582–94.
  • Klaidman, Daniel, Kill or Capture: The War on Terror and the Soul of the Obama Presidency (Boston: Houghton Mifflin Harcourt 2012).
  • Mannes, Aaron, ‘Testing the Snake Head Strategy: Does Killing or Capturing its Leaders Reduce a Terrorist Group’s Activity?’, Journal of International Policy Solutions 9 (2008), 40–9.
  • Mazzetti, Mark, ‘How a single spy helped turn Pakistan against the United States’, New York Times, 9 Apr. 2013.
  • Miller, Greg and Julie Tate, ‘CIA shifts focus to killing targets’, Washington Post, 1 Sept. 2011.
  • National Security Studies Program, The Drone War in Pakistan, New America Foundation, <http://natsec.newamerica.net/drones/pakistan/analysis>.
  • Nesser, Petter, ‘How did Europe’s Global Jihadis Obtain Training for their Militant Causes?’, Terrorism and Political Violence 20/2 (2008), 234–56.
  • Neumann, Peter, Ryan Evans and Raffaello Pantucci, ‘Locating Al Qaeda’s Center of Gravity: The Role of Middle Managers’, Studies in Conflict and Terrorism 34/11 (2011), 825–42.
  • Pantucci, Raffaello, ‘Deep Impact: The Effect of Drone Attacks on British Counter- terrorism’, RUSI Journal 154/5 (2009), 72–6.
  • Pantucci, Raffaello, ‘Manchester, New York and Oslo: Three Centrally Directed Al Qa’ida Plots’, CTC Sentinel 3/8 (2010), 10–13.
  • Pantucci, Raffaello, A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorist (London: International Centre for the Study of Radicalisation and Political Violence 2011).
  • Price, Bryan C., ‘Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism’, International Security 36/4 (2012), 9–46.
  • Ranstorp, Magnus, ‘Terrorist Awakening in Sweden?’, CTC Sentinel 4/1 (2011), 1–5.
  • Rassler, Don, Gabriel Koehler-Derrick, Liam Collins, Muhammad al-Obaidi and Nelly Lahoud, ‘Letters from Abbottabad: Bin Ladin Sidelined?’, Combating Terrorism Center at West Point, Document SOCOM-2012-0000015, 2012.
  • Reinares, Fernando, ‘The Madrid Bombings and Global Jihadism’, Survival 52/2 (2010), 83–104.
  • Roggio, Bill, ‘Top Al Qaeda Leader Mustafa Abu Yazid Confirmed Killed in Airstrike in North Waziristan’, Long War Journal, 31 May 2010.
  • Roggio, Bill and Alexander Mayer, ‘Charting the Data for US Airstrikes in Pakistan, 2004–2013’, Long War Journal, <http://www.longwarjournal.org/pakistan-strikes.php>.
  • Roggio, Bill and Alexander Mayer, ‘Senior Al Qaeda and Taliban Leaders Killed in US Airstrikes in Pakistan, 2004–2013’, Long War Journal, <http://www.longwarjournal.org/pakistan-strikes.php>.
  • Shane Scott, ‘Election spurred a move to codify US drone policy’, New York Times, 24 Nov. 2012.
  • Silber, Mitchell D., ‘Al-Qa’ida’s Center of Gravity in a Post-Bin Ladin World’, CTC Sentinel 4/11–12 (2011), 1–4.Strobel, Warren and Peter Cooney, ‘Strikes on Al Qaeda Leave Only “Handful” of Top Targets’, Reuters, 22 June 2012.
  • Sude, Barbara, Al Qaeda Central: An Assessment of the Threat Posed by the Terrorist Group Headquartered on the Afghanistan-Pakistan Border (New American Foundation Feb. 2010).Yousafzai, Sami and Ron Moreau, ‘Al Qaeda on the Ropes: One Fighter’s Inside Story’, Newsweek, 2 Jan. 2012.
  • Zelin, Aaron Y., ‘Dodging the Drones: How Militants have Responded to the Covert US Campaign’, Foreign Policy, 31 Aug. 2012.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.