References
- Affi, L., A. A. Elmi, W. Knight, and A. Said Mohamed. 2016. “Countering Piracy through Private Security in the Horn of Africa: Prospects and Pitfalls.” Third World Quarterly 37 (5): 934–950. doi:10.1080/01436597.2015.1114882.
- Ball, R. 2011. “The Strategic Utility of New Zealand Special Forces.” Small Wars and Insurgencies 22 (1): 119–141. doi:10.1080/09592318.2011.546594.
- Bridger, J. M. 2013. “The Rise and Fall of Somalia’s Pirate King.” Foreign Policy, November 2013. https://foreignpolicy.com/2013/11/04/the-rise-and-fall-of-somalias-pirate-king/
- Bueger, C. 2015. “Learning from Piracy: Future Challenges of Maritime Security Governance.” Global Affairs 1 (1): 33–42. doi:10.1080/23340460.2015.960170.
- Bueger, C. 2018. “Territory, Authority, Expertise: Global Governance and the Counter-Piracy Assemblage.” European Journal of International Relations 24 (3): 614–637. doi:10.1177/1354066117725155.
- Byman, D., and I. A. Merritt. 2018. “The New American Way of War: Special Operations Forces in the War on Terrorism.” The Washington Quarterly 41 (2): 79–93. doi:10.1080/0163660X.2018.1484226.
- Casal,J., Clement,V. W. C.; Esen,F., Fernando,F. M. U., Gorrissen, C., Kisaka, G. L., Lamair, D., Levine, T. A., Roos,P. R., Stephenson,K. M., Yikona, S. .2013. Pirate Trails: Tracking the Illicit Financial Flows from Pirate Activities off the Horn of Africa. Washington D.C.: World Bank.
- Danish Ministry of Foreign Affairs. 2021. “Denmark Deploys a Vessel Contribution in order to Fight the Pirates in the Gulf of Guinea.” March 16. https://um.dk/en/news/newsdisplaypage/?newsid=6da331b4-b01c-4781-857f-6aa2ab42ee12
- Duijn, P. A. C., V. Kashirin, and P. M. A. Sloot. 2015. “The Relative Ineffectiveness of Criminal Network Disruption.” Nature Scientific Reports 4 (1): 1–15.
- Eriksson, G., U. Pettersson, and U. Molin. 2017. “Introduction.” In Special Operations from a Small State Perspective: Future Security Challenges, edited by Eriksson, G. and U. Pettersson. Cham: Palgrave Macmillan.
- Felbab-Brown, V. 2017. “Organized Crime, Illicit Economies, Civil Violence & International Order: More Complex Than You Think.” Daedalus 146 (4): 98–111. doi:10.1162/DAED_a_00462.
- Finlan, A. 2008. Special Forces, Strategy and the War on Terror: Warfare by Other Means. London: Routledge.
- Finlan, A. 2019. “A Dangerous Pathway? Toward A Theory of Special Forces.” Comparative Strategy 38 (4): 255–275. doi:10.1080/01495933.2019.1633181.
- Gebhard, C., and S. J. Smith. 2015. “The Two Faces of EU–NATO Cooperation: Counter-piracy Operations off the Somali Coast.” Cooperation and Conflict 50 (1): 107–127. doi:10.1177/0010836714532917.
- Gray, C. S. 1999. Explorations in Strategy. Westport: Praeger Publishers.
- Grimeland, T., and O. Van Der Veen 2016. “Maritime SOF in the Littorals: Theoretical Principles for Successful Littoral Special Operations”. Master thesis, Monterey: Naval Postgraduate School.
- Henningsen, T. B. 2019. “Dare to Know: The Problem of Overcoming Information Asymmetry for Special Operations Forces in Military Assistance Operations.” Special Operations Journal 5 (2): 162–178. doi:10.1080/23296151.2019.1671097.
- International Maritime Organization. 2021. IMO Urges Action to Deter Piracy in Gulf of Guinea. February 14, https://www.imo.org/en/MediaCentre/PressBriefings/pages/03-piracy-Gulf-of-Guinea.aspx
- Jacobsen, K. L., and J. Larsen. 2019. “Piracy Studies Coming of Age: A Window on the Making of Maritime Intervention Actors.” International Affairs 95 (5): 1037–1054. doi:10.1093/ia/iiz099.
- Jordan, J. 2014. “Attacking the Leader, Missing the Mark.” International Security 38 (4): 7–38. doi:10.1162/ISEC_a_00157.
- Kiras, J. D. 2006. Special Operations and Strategy: From World War II to the War on Terrorism. London: Routledge.
- Lamb, C., and D. Tucker. 2007. United States Special Operations Forces. New York: Columbia University Press.
- Larsen, J., and C. Nissen. 2017. Learning from Danish Counter-piracy off the Coast of Somalia. Copenhagen: Danish Institute for International Studies.
- Leslau, O. 2010. “Worth the Bother? Israeli Experience and the Utility of Special Operations Forces.” Contemporary Security Policy 31 (3): 509–530. doi:10.1080/13523260.2010.521703.
- McChrystal, S. 2013. My Share of the Task: A Memoir. New York: Penguin.
- McCormick, T. 2015. “Exclusive: U.S. Operates Drones from Secret Bases in Somalia.” Foreign Policy. https://foreignpolicy.com/2015/07/02/exclusive-u-s-operates-drones-from-secret-bases-in-somalia-special-operations-jsoc-black-hawk-down/
- McKnight, T. 2012. Pirate Alley: Commanding Task Force 151 Off Somalia. Annapolis: Naval Institute Press.
- Modigs, R. 2017. “The Utility of Special Operations in Small States.” In Special Operations from a Small State Perspective, edited by Eriksson, G. and U. Pettersson, 43–64. Cham: Palgrave Macmillan.
- Morcos, P. 2021. A Transatlantic Approach to Address Growing Maritime Insecurity in the Gulf of Guinea. Washington D.C.: Center for Strategic & International Studies. https://www.csis.org/analysis/transatlantic-approach-address-growing-maritime-insecurity-gulf-guinea
- Morselli, C., M. Turcotte, and V. Tenti. 2011. “The Mobility of Criminal Groups.” Global Crime 12 (3): 165–188. doi:10.1080/17440572.2011.589593.
- Murphy, M. 2012. CIWAG Maritime Irregular Warfare Studies 5. https://digital-commons.usnwc.edu/ciwag-case-studies/11
- Murphy, M. N. 2016. “Piracy off the Somali Coast: Is There Light at the End of the Tunnel?” In Routledge Handbook of Naval Strategy and Security, edited by Krause, J. and S. Bruns.239–250. Abingdon: Taylor and Francis.
- North Atlantic Treaty Organization. 2013. Allied Joint Doctrine for Special Operations. Brussels: NATO standardization agency.
- North Atlantic Treaty Organization. 2021. Participating Forces in Ocean Shield. https://mc.nato.int/missions/operation-ocean-shield/participating-forces
- Pelton, R. Y. 2020. SomaliaReport. “Weekly Piracy Report. 2020.” http://www.piracyreport.com/
- Percy, S., and A. Shortland. 2013. “The Business of Piracy in Somalia.” Journal of Strategic Studies 36 (4): 541–578. doi:10.1080/01402390.2012.750242.
- Peter, T. 2011. “Somali Pirates Lose Battle to South Korean Commandos, but Who’s Winning War?” Christian Science Monitor. 21 January 2011. https://www.csmonitor.com/World/terrorism-security/2011/0121/Somali-pirates-lose-battle-to-South-Korean-commandos-but-who-s-winning-war
- Phillips, S. G. 2019. “Making Al-Qa’ida Legible: Counter-Terrorism and the Reproduction of Terrorism.” European Journal of International Relations 25 (4): 1132–1156. doi:10.1177/1354066119837335.
- Rice, X., 2011. “Somali Pirates Should Face Special Courts, Says UN Envoy.” The Guardian, 26 January 2011. https://www.theguardian.com/world/2011/jan/26/somali-pirates-jack-lang-report
- Rivera, M. T., S. B. Soderstrom, and B. Uzzi. 2010. “Dynamics of Dyads in Social Networks: Assortative, Relational, and Proximity Mechanisms.” Annual Review of Sociology 36 (1): 91–115. doi:10.1146/annurev.soc.34.040507.134743.
- Roehrig, T. 2012. “South Korea’s Counterpiracy Operations in the Gulf of Aden.” In Global Korea: South Korea’s Contributions to International Security, edited by Bruce, S., J. Hemmings, B. Y. Hwang, T. Roehrig, and S. A. Snyder.28-44. New York: Council of Foreign Relations.
- Saradzhyan, S. 2010. “The Dynamics of Russia’s Response to the Piracy Threat.” Connections 9 (3): 19–44.
- Shamir, E., and E. Ben-Ari. 2018. “The Rise of Special Operations Forces: Generalized Specialization, Boundary Spanning and Military Autonomy.” Journal of Strategic Studies 41 (3): 335–371. doi:10.1080/01402390.2016.1209656.
- Shortland, A. 2015. “Can We Stop Talking about Somali Piracy Now? A Personal Review of Somali Piracy Studies.” Peace Economics, Peace Science and Public Policy 21 (4): 419–431. doi:10.1515/peps-2015-0018.
- Shortland, A. 2019. Kidnap - inside the Ransom Business. Oxford: Oxford University Press.
- Shortland, A., and F. Varese. 2014. “The Protector’s Choice: An Application of Protection Theory to Somali Piracy.” British Journal of Criminology 54 (5): 741–764. doi:10.1093/bjc/azu046.
- Smed, U. T., and A. Wivel. 2017. “Vulnerability without Capabilities? Small State Strategy and the International Counter-Piracy Agenda.” European Security 26 (1): 79–98. doi:10.1080/09662839.2016.1265941.
- Sörenson, K., and J. J. Widen. 2014. “Irregular Warfare and Tactical Changes: The Case of Somali Piracy.” Terrorism and Political Violence 26 (3): 399–418. doi:10.1080/09546553.2012.725681.
- Spiegel International. 2009. German Elite Troop Abandons Plan to Free Pirate Hostages. May 4, 2009. https://www.spiegel.de/international/germany/mission-impossible-german-elite-troop-abandons-plan-to-free-pirate-hostages-a-622766.html
- Svendsen, A. D. M. 2014. “Sharpening SOF Tools, Their Strategic Use and Direction: Optimising the Command of Special Operations amid Wider Contemporary Defence Transformation and Military Cuts.” Defence Studies 14 (3): 284–309. doi:10.1080/14702436.2014.890341.
- The Bureau of Investigative Journalism. 2021. Somalia: Reported US Covert Actions 2001–2016. 23 March 2021, https://www.thebureauinvestigates.com/drone-war/data/somalia-reported-us-covert-actions-2001-2017
- Walsh, J. I. 2018. “The Rise of Targeted Killing.” Journal of Strategic Studies 41 (1–2): 143–159. doi:10.1080/01402390.2017.1393035.
- Westberg, A. B. 2016. “Anti-piracy in a Sea of Predation: The Interaction of Navies, Fishermen and Pirates off the Coast of Somalia.” Journal of the Indian Ocean Region 12 (2): 209–226. doi:10.1080/19480881.2015.1090157.
- Westberg, A. B. 2019. “Maritime Predation off the Horn of Africa: Introducing Somali Piracy Dataset, 1991–2019 - Version 4.0. Edited from Volume 1.0” in Princes of Predation, Thieves of Disorder - A Study of Somali Piracy, 1991–2015. PhD dissertation, Odense: University of Southern Denmark.
- Wey, A. L. K. 2014. “Principles of Special Operations: Learning from Sun Tzu and Frontinus.” Comparative Strategy 33 (2): 131–144. doi:10.1080/01495933.2014.897119.