Reference list
- Allen, S. H. (2007). Time bombs: Estimating the duration of coercive bombing campaigns. Journal of Conflict Resolution, 51, 112–133. doi: 10.1177/0022002706296153
- Amnesty International. (2017). At any cost: The civilian catastrophe in West Mosul. London: Author.
- Andersson, R., & Weigand, F. (2015). Intervention at risk: The vicious cycle of distance and danger in Mali and Afghanistan. Journal of Intervention and Statebuilding, 9, 519–541. doi: 10.1080/17502977.2015.1054655
- Andres, R. B., Wills, C., & Griffiths Jr T. E. (2005/2006). Winning with allies: The strategic value of the Afghan campaign. International Security, 30(3), 124–160. doi:10.1162/isec.2005.30.3.124 doi: 10.1162/016228805775969591
- Anglim, S. (2011). Covert operations and strategy. Infinity Journal, 2(1), 16–19.
- Avant, D. (2005). The market for force: The consequences of privatizing security. New York, NY: Cambridge University Press.
- Avant, D., & Sigelman, L. (2010). Private security and democracy: Lessons from the US in Iraq. Security Studies, 19, 230–265. doi: 10.1080/09636412.2010.480906
- Bergen, P., & Tiedemann, K. (2011). Washington’s Phantom war: The effects of the U.S. drone program in Pakistan. Foreign Affairs, 90(4), 12–18.
- Biddle, S. D. (2005/2006). Allies, airpower, and modern warfare: The Afghan model in Afghanistan and Iraq. International Security, 30(3), 161–176. doi:10.1162/isec.2005.30.3.161 doi: 10.1162/016228805775969555
- Boyle, M. J. (2010). Do counterterrorism and counterinsurgency go together? International Affairs, 86, 333–353. doi: 10.1111/j.1468-2346.2010.00885.x
- Boyle, M. J. (2013). The costs and consequences of drone warfare. International Affairs, 89, 1–29. doi: 10.1111/1468-2346.12002
- Brown, S. (2016). Purposes and pitfalls of war by proxy: A systemic analysis. Small Wars & Insurgencies, 27, 243–257. doi: 10.1080/09592318.2015.1134047
- Bruneau, T. (2013). Contracting out security. Journal of Strategic Studies, 36, 638–665. doi: 10.1080/01402390.2012.663254
- Bunker, R. J. (2013/2014). Defeating violent non-state actors. Parameters, 43(4), 57–65.
- Byman, D. L. (2006). Friends like these: Counterinsurgency and the war on terrorism. International Security, 31(2), 79–115. doi: 10.1162/isec.2006.31.2.79
- Byman, D. L. (2013). Why drones work. Foreign Affairs, 92(4), 32–43.
- Byman, D. L., & McCants, W. (2017). Fight or flight: How to avoid a forever war against Jihadists. The Washington Quarterly, 40(2), 67–77. doi: 10.1080/0163660X.2017.1328923
- Cassidy, R. (2006). The long small war: Indigenous forces for counterinsurgency. Parameters, 36, 47–62.
- Charap, S. (2015). The ghost of hybrid war. Survival, 57(6), 51–58. doi: 10.1080/00396338.2015.1116147
- Clegg, M. (2012). Protecting British soldiers in Afghanistan. The RUSI Journal, 157(3), 22–30. doi: 10.1080/03071847.2012.695164
- Cornish, C. (2003). Myth and reality: US and UK approaches to casualty aversion and force protection. Defence Studies, 3, 121–128. doi:10.1080/14702430308405068 doi: 10.1080/1470243032000214322
- Cronin, A. K. (2013). Why drones fail. Foreign Affairs, 92(4), 44–54.
- Dandeker, C. (2010). From victory to success: The changing mission of Western armed forces. In J. Angstrom & I. Duyvesteyn (Eds.), Modern war and the utility of force: Challenges, methods and strategy (pp. 16–38). Abingdon: Routledge.
- De Luce, D. & McLeary, P. (2017, March 9). Trump’s ramped-up bombing in Yemen signals more aggressive use of military. Foreign Policy. Retrieved from http://foreignpolicy.com/2017/03/09/trumps-ramped-up-bombing-in-yemen-signals-more-aggressive-use-of-military/
- De Young, K. (2010, June 22). US indirectly paying Afghan warlord as part of security contract. The Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2010/06/21/AR2010062104628.html
- Duffield, M. (2010). Risk management and the fortified aid compound: Everyday life in post-interventionary society. Journal of Intervention and Statebuilding, 4, 453–474. doi: 10.1080/17502971003700993
- Elkus, A. (2011). Covert operations and policy. Infinity Journal, 2(1), 13–16.
- Erdmann, A. P. N. (1999). The U.S. presumption of quick, costless wars. Orbis, 363–381. doi: 10.1016/S0030-4387(99)80077-5
- Farrell, F., & Semple, M. (2015/2016). Making peace with the Taliban. Survival, 57(6), 79–110. doi: 10.1080/00396338.2015.1116157
- Felbab-Brown, V. (2016a, May 25). The hits and misses of targeting the Taliban. The New York Times. Retrieved from https://www.nytimes.com/2016/05/26/opinion/the-hits-and-misses-of-targeting-the-taliban.html
- Felbab-Brown, V. (2016b). Hurray for militias? Not so fast: Lessons from the Afghan local police experience. Small Wars & Insurgencies, 27, 258–281. doi: 10.1080/09592318.2015.1129169
- Finlan, A. (2014). Contemporary military strategy and the global War on terror: US and UK armed forces in Afghanistan and Iraq 2001-2012. New York, NY: Bloomsbury.
- Friedrichs, J., & Friesendorf, C. (2009). Privatized security cripples statebuilding; Iraq is a case in point. The American Interest, 4(5), 43–48.
- Gallagher, M. (2016, January 30). Welcome to the age of the commando. The New York Times. Retrieved from https://www.nytimes.com/2016/01/31/opinion/sunday/welcome-to-the-age-of-the-commando.html
- George, S. (2017, July 1). In final stages of Mosul fight, U.S. troops take on expanded role. Chicago Tribune. Retrieved from http://www.chicagotribune.com/news/nationworld/ct-islamic-state-mosul-20170701-story.html
- Greentree, T. (2013). Bureaucracy does its thing: US performance and the institutional dimension of strategy in Afghanistan. Journal of Strategic Studies, 36, 325–356. doi: 10.1080/01402390.2013.764518
- Hall, M. T., & McChrystal, S. A. (2009). Commander’s counterinsurgency guidance. Kabul: International Security Assistance Force.
- Handel, M. I. (2005). Masters of war: Classical strategic thought. London: Routledge.
- Hawramy, F., & Graham-Harrison, E. (2016, October 29). Islamic state using hostages as human shields in Mosul – UN. The Guardian. Retrieved from https://www.theguardian.com/world/2016/oct/28/islamic-state-uses-hostages-as-human-shields-mosul-says-un
- Hiltermann, J. (2017, July 1). Iraq: The battle to come. The New York Review of Books. Retrieved form http://www.nybooks.com/daily/2017/07/01/iraq-the-battle-to-come/
- Hosmer, S. T. (2001). Operations against enemy leaders. Santa Monica, CA: The Rand Corporation.
- Howard, M. (1978). War and the liberal conscience: The George Macaulay Trevelyan lectures in the University of Cambridge, 1977. London: Temple Smith.
- Hudson, L., Owens, C. S., & Flannes, M. (2011). Drone warfare: Blowback from the new American way of war. Middle East Policy, 18, 122–132. doi: 10.1111/j.1475-4967.2011.00502.x
- Hughes, G. A. (2014). Syria and the perils of proxy war. Small Wars & Insurgencies, 25, 522–538. doi: 10.1080/09592318.2014.913542
- Hughes, G. A. (2016). Militias in internal warfare: From the colonial era to the contemporary Middle East. Small Wars & Insurgencies, 27, 196–225. doi: 10.1080/09592318.2015.1129171
- Ignatieff, M. (2001). Virtual war: Kosovo and beyond. London: Vintage.
- Johnson, C. (2000). Blowback: The costs and consequences of American empire. New York, NY: Henry Holt and Company.
- Johnson, R. (2014). Upstream engagement and downstream entanglements: The assumptions, opportunities and threats of partnering. Small Wars & Insurgencies, 25, 647–668. doi: 10.1080/09592318.2014.913755
- Johnston, P. B. (2012). Does leadership decapitation work: Assessing the effectiveness of leadership targeting in counterinsurgency campaigns. International Security, 36(4), 47–79. doi: 10.1162/ISEC_a_00076
- Johnston, P. B., & Sarbahi, A. K. (2016). The impact of U.S. drone strikes on terrorism in Pakistan. International Studies Quarterly, 60, 203–219. doi: 10.1093/isq/sqv004
- Jordan, J. (2009). Heads will roll: Assessing the effectiveness of leadership decapitation. Security Studies, 18, 719–755. doi: 10.1080/09636410903369068
- Kilcullen, D. (2009). The accidental Guerrilla: Fighting small wars in the midst of a big one. New York, NY: Oxford University Press.
- Kilcullen, D., & Exum, A. M. (2009, May 16). Death from above, outrage from below. The New York Times. Retrieved from http://www.nytimes.com/2009/05/17/opinion/17exum.html
- King, A. (2010). Understanding the Helmand campaign: British military operations in Afghanistan. International Affairs, 86, 311–332. doi: 10.1111/j.1468-2346.2010.00884.x
- Kiras, J. (2012). Special operations and strategies of attrition. Infinity Journal, 2(1), 18–21.
- Kreps, S., & Zenko, M. (2014). The next drone wars: Preparing for proliferation. Foreign Affairs, 93(2), 68–79.
- Krieg, A. (2016). Externalising the burden of war: The Obama doctrine and US foreign policy in the Middle East. International Affairs, 92, 97–113. doi: 10.1111/1468-2346.12506
- Ledwidge, F. (2011). Losing small wars. New Haven, CT: Yale University Press.
- Libicki, M. C. (2013). Tangled web: Cyberwar fears pose dangers of unnecessary escalation. RAND Review. Retrieved from https://www.rand.org/pubs/periodicals/rand-review/issues/2013/summer/cyberwar-fears-pose-dangers-of-unnecessary-escalation.html
- Lindsay, J. R. (2003). Stuxnet and the limits of cyber warfare. Security Studies, 22, 365–404. doi: 10.1080/09636412.2013.816122
- Long, A. (2014). Whack-a-Mole or Coup de Grace: Leadership targeting in Iraq and Afghanistan. Security Studies, 23, 471–512. doi: 10.1080/09636412.2014.935229
- Lujan, F. M. (2013). Light footprints: The future of American military interventions. Washington, DC: Center for a New American Security.
- Maass, M. (2015). From U-2s to drones: U.S. aerial espionage and targeted killing during the cold war and the war on terror. Comparative Strategy, 34, 218–238. doi: 10.1080/01495933.2015.1017385
- Malkesian, C., & Weston, J. K. (2012). War downsized. Foreign Affairs, 91(2), 111–121.
- Martin, P., & Kozak, C. (2016, February 3). The pitfalls of relying on Kurdish forces to counter ISIS. Institute for the Study of War. Retrieved from http://understandingwar.org/backgrounder/pitfalls-relying-kurdish-forces-counter-isis
- Mayer, M. (2015). The new killer drones: Understanding the strategic implications of next-generation unmanned combat aerial vehicles. International Affairs, 91, 765–780. doi: 10.1111/1468-2346.12342
- Megerisi, T. (2016, November 28). Libya’s hollow victory over the Islamic state. Foreign Policy. Retrieved from http://foreignpolicy.com/2016/11/28/libyas-hollow-victory-over-the-islamic-state/
- Morgan, T. C., & Campbell, S. H. (1991). Domestic structure, decisional constraints, and wars: So why Kant democracies fight? Journal of Conflict Resolution, 35, 187–211. doi: 10.1177/0022002791035002003
- Mumford, A. (2013). Proxy warfare and the future of conflict. The RUSI Journal, 158(2), 40–46. doi: 10.1080/03071847.2013.787733
- Open Society Foundations. (2011). The cost of kill/capture: Impact of night raid surge on Afghan civilians. Kabul: Author.
- Pamuk, H., & Bektas, U. (2016, August 26). Turkey fires on U.S.-backed Kurdish militia in Syria offensive. Reuters. Retrieved from http://www.reuters.com/article/us-mideast-crisis-syria-turkey-idUSKCN10Z07J
- Pape, R. A. (2003). The strategic logic of suicide terrorism. American Political Science Review, 97, 343–361. doi: 10.1017/S000305540300073X
- Perry, M. (2015, December 15). How Iraq’s army could defeat ISIS in Mosul – but lose control of the country. Politico Magazine. Retrieved from http://www.politico.com/magazine/story/2016/12/iraq-army-mosul-isis-214531
- Perry, P. (2012). Blackwater vs. Bin laden: The private sector’s role in American counterterrorism. Comparative Strategy, 31, 41–55. doi: 10.1080/01495933.2012.647534
- Porch, D. (2014). Expendable soldiers. Small Wars & Insurgencies, 25, 696–716. doi: 10.1080/09592318.2014.893974
- Porter, P. (2014). Goodbye to all that: On small wars and big choices. Small Wars & Insurgencies, 25, 685–695. doi: 10.1080/09592318.2014.914127
- Porter, P. (2015). The global village myth: Distance, war, and the limits of power. London: Hurst.
- Prados, P. (2012). The continuing quandary of covert operations. Journal of National Security Law and Policy, 5(2), 359–372.
- Price, B. C. (2012). Targeting top terrorists: How leadership decapitation contributes to counterterrorism. International Security, 36(4), 9–46. doi: 10.1162/ISEC_a_00075
- Rasmussen, M. V. (2006). The risk society at war: Terror, technology and strategy in the twenty-first century. New York, NY: Cambridge University Press.
- Record, J. (2000). Force protection fetish: Sources, consequences (?) and solutions. Aerospace Power Journal, 14, 4–11.
- Ricks, R. (2006). Fiasco: The American military adventure in Iraq. New York, NY: The Penguin Press.
- Rose, G. (2013). Generation kill: A conversation with Stanley McChrystal. Foreign Affairs, 92(2), 2–8.
- Ryan, M. & Raghavan, S. (2016, August 9). U.S. special operations troops aiding Libyan forces in major battle against Islamic State. The Washington Post. Retrieved from https://www.washingtonpost.com/news/checkpoint/wp/2016/08/09/u-s-special-operations-forces-are-providing-direct-on-the-ground-support-for-the-first-time-in-libya/
- Sanger, D. E. (2013). Confront and conceal: Obama’s secret wars and surprising use of American power. New York, NY: Random House.
- Scheipers, S. (2015). Auxilliaries at war in the Middle East. Survival, 57(4), 121–138. doi: 10.1080/00396338.2015.1068569
- Schooner, S. L. (2008). Why contractor fatalities matter. Parameters, 38, 78–91.
- Sedra, M. (2006). Security sector reform in Afghanistan: The slide toward expediency. International Peacekeeping, 13, 94–110. doi: 10.1080/13533310500424868
- Shaw, M. (2002). Risk-transfer militarism, small massacres, and the historic legitimacy of war. International Relations, 16, 343–359. doi: 10.1177/0047117802016003003
- Slayton, R. (2016/2017). What is the cyber offense-defense balance? Conceptions, causes, and assessment. International Security, 41(3), 72–109. doi: 10.1162/ISEC_a_00267
- Smith, H. (2005). What costs will democracies bear? A review of popular theories of casualty aversion. Armed Forces and Society, 31, 487–512. doi: 10.1177/0095327X0503100403
- Smith, R. (2005). The utility of force: The art of war in the modern world. London: Penguin.
- Stein, A. (2017, June 12). The trouble with Tanf: Tactics driving strategy in Syria. War on the Rocks. Retrieved from https://warontherocks.com/2017/06/the-trouble-with-tanf-tactics-driving-strategy-in-syria/
- Strachan, H. (2013). The direction of war: Contemporary strategy in historical perspective. New York, NY: Cambridge University Press.
- Thomas, J., & Dougherty, C. (2013). Beyond the ramparts: The future of U.S. special forces operations. Washington, DC: Centre for Strategic and Budgetary Assessments.
- Tierney, J. F. (2010). Warlord, Inc.: Extortion and corruption along the U.S. supply chain in Afghanistan. Washington, DC: U.S. House of Representatives.
- U.S. Army and Marine Corps. (2006). FM 3-24, counterinsurgency. Washington, DC: U.S. Department of Defense.
- Vlahos, M. (2007). Fighting identity: Why we are losing our wars. Military Review, 87(6), 2–12.
- Weiner, T. (2007). Legacy of ashes: The history of the CIA. New York, NY: Random House.
- Zenko, M. (2010). Between threats and war: U.S. discrete military operations in the post-cold war world. Stanford, CA: Stanford University Press.
- Zenko, M. (2015, May 29). The new unknown soldiers of Iraq and Afghanistan. Foreign Policy. Retrieved from http://foreignpolicy.com/2015/05/29/the-new-unknown-soldiers-of-afghanistan-and-iraq/