References
- Abrahms, M. 2012. “The Political Effectiveness of Terrorism Revisited.” Comparative Political Studies 45 (3): 366–393. doi:10.1177/0010414011433104.
- Abuza, Z. 2009. “Jemaah Islamiyah Adopts the Hezbollah Model.” Middle East Quarterly Winter: 15–26.
- ACLU/CCR (American Civil Liberties Union and Center for Constitutional Rights). 2015. Al-Aulaqi V. Panetta: Complaint. In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 259–275. New York: IDebate Press.
- al-Dagher, M., and K. Kalthenhaler. 2016. “Why Iraqis Living under the Islamic State Fear Their Liberators.” Washington Post. April 11. Accessed April 20, 2016. https://www.washingtonpost.com/news/monkey-cage/wp/2016/04/11/why-iraqis-living-under-the-islamic-state-fear-their-liberators/?utm_source=Sailthruutm_medium=email&utm_campaign=New%20Campaign&utm_term=%2ASituation%20Report.
- Al-Muslimi, F. 2015. “Statement of Farea Al-Muslimi.” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 65–81. New York: IDebate Press.
- Anderson, K. 2015a. “The Case for Drones (Excerpt).” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 57–64. New York: IDebate Press.
- Anderson, K. 2015b. “The Case for Drones (Excerpt).” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 187–199. New York: IDebate Press.
- Beckhusen, R., and M. Gault. 2015. “Drones Kill Innocent People All the Time: But Now the White House Can’t Deny It.” War is Boring.com. April 23. Accessed November 16, 2016. https://warisboring.com/drones-kill-innocent-people-all-the-time-36d5779e92ac#.b723d2cmm.
- Berntzen, L. E., and S. Sandberg. 2014. “The Collective Nature of Lone Wolf Terrorism: Anders Behring Breivik and the Anti-Islamic Social Movement.” Terrorism and Political Violence 26 (5): 759–779. doi:10.1080/09546553.2013.767245.
- BIJ (Bureau for Investigative Journalism). 2014. “Drone Strikes in Pakistan.” Accessed November 20, 2016. http://wherethedronesstrike.com/report/83.
- Bilandzić, M. 2013. “Contribution to the Debate on Terrorism: Is There a State Terrorism?” International Scientific Defence, Security and Peace Journal 13 (24): 39–57.
- Blakeley, R. 2007. “Bringing the State Back into Terrorism Studies.” European Political Science 6 (3): 228–235. doi:10.1057/palgrave.eps.2210139.
- Blakeley, R. 2008. “The Elephant in the Room: A Response to John Horgan and Michael J. Boyle.” Critical Studies on Terrorism 1 (2): 151–165. doi:10.1080/17539150802184561.
- Blakeley, R. 2009. State Terrorism and Neoliberalism: The North in the South. London: Routledge.
- Blakeley, R. 2010. “State Terrorism in the Social Sciences: Theories, Methods and Concepts.” In Contemporary State Terrorism: Theory and Practice, edited by R. Jackson, E. Murphy, and S. Poynting, 12–27. New York: Routledge.
- Bockstette, C. 2008. “Jihadist Terrorist Use of Strategic Communication Management Techniques.” In George C. Marshall Center – European Center for Security Studies.
- Bockstette, C. 2009. “Taliban and Jihadist Terrorist Use of Strategic Communication.” Connections: The Quarterly Journal 8 (3): 1–26.
- Booth, K. 2007. Theory of World Security. Vol. 105. Cambridge: Cambridge University Press.
- Brennan, J. O. 2015. “The Efficacy and Ethics of U.S. Counterterrorism Strategy.” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 29–45. New York: IDebate Press.
- CNN. 2014. “Life under ISIS Rule; Imagine a World.” CNN, December 22. Accessed April 17, 2015. http://edition.cnn.com/TRANSCRIPTS/1412/22/ampr.01.html.
- Cockburn, P. 2015. “Why Jihadi John’s ‘Assassination’ Is Nowhere near as Important as You Think.” The Independent, November 13. Accessed November 15, 2015. http://www.independent.co.uk/voices/jihadi-john-assassination-will-make-little-difference-to-isis-on-the-ground-a6733646.html.
- Cronin, A. K. 2009. How Terrorism Ends: Understanding the Decline and Demise of Terrorist Campaigns. Princeton: Princeton University Press.
- Davenport, C. 2007. “State Repression and Political Order.” Annual Review of Political Science 10: 1–23. doi:10.1146/annurev.polisci.10.101405.143216.
- Davis, V. 2013. “Reading Anonymity: Narrative Difference and Framework Selection in the Claiming of Terrorist Violence.” Media, War & Conflict 6 (2): 135–151. doi:10.1177/1750635213481087.
- Della Porta, D. 2013. “Political Violence and Social Movements: An Introduction.” In Clandestine Political Violence (Cambridge Studies in Contentious Politics), 1–31. Cambridge: Cambridge University Press.
- Eccarius-Kelly, V. 2013. “Surreptitious Lifelines: A Structural Analysis of FARC and the PKK.” In Intersections of Crime and Terror, edited by J. J. F. Forest, 65–88. New York: Routledge.
- Feldman, M. 2013. “Comparative Lone Wolf Terrorism: Toward a Heuristic Definition.” Democracy and Security 9 (3): 270–286. doi:10.1080/17419166.2013.792252.
- Flanigan, S. T. 2012. “Terrorists Next Door? A Comparison of Mexican Drug Cartels and Middle Eastern Terrorist Organizations.” Terrorism and Political Violence 24: 279–294. doi:10.1080/09546553.2011.648351.
- Forcese, C., and K. Roach. 2015. False Security: The Radicalization of Canadian Anti-Terrorism. Toronto: Irwin Law Inc.
- Garamone, J. 2002. “Unmanned Aerial Vehicles Proving Their Worth Over Afghanistan.” US Department of Defense News, April 16. Accessed November 16, 2016. http://archive.defense.gov/news/newsarticle.aspx?id=44165.
- Gettinger, D. 2015. “The Disposition Matrix.” Center for the Study of the Drone. Accessed November 17, 2016. http://dronecenter.bard.edu/the-disposition-matrix/.
- Hall, R. 2016. “New Pentagon Rules Allow Anti-Isis Airstrikes that Could Cause More Civilian Deaths.” Global Post, April 20. Accessed November 16, 2016. http://www.pri.org/stories/2016-04-20/pentagons-new-rules-allow-anti-isis-airstrikes-when-civilian-deaths-are-more.
- Hammes, T. X. 2007. “Fourth Generation Warfare Evolves, Fifth Emerges.” Military Review 87 (3).
- Hanhimäki, J. M., and B. Blumenau, eds. 2013. An International History of Terrorism: Western and Non-Western Experiences. New York: Routledge.
- Hines, K. R. 2015. Drones and the Ethics of Targeted Killing. New York: Rowman and Littlefield.
- Holden, R. H. 1996. “Constructing the Limits of State Violence in Central America: Towards a New Research Agenda.” Journal of Latin American Studies 28 (02): 435–459. doi:10.1017/S0022216X00013067.
- Horgan, J., and M. J. Boyle. 2008. “A Case against ‘Critical Terrorism Studies’.” Critical Studies on Terrorism 1 (1): 51–64. doi:10.1080/17539150701848225.
- Jaber, F. B. A. 2015. “Letter to Obama and Hadi on Yemeni Drones.” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 381–384. New York: IDebate Press.
- Jackson, R. 2011. “In Defence of ‘Terrorism’: Finding a Way through a Forest of Misconceptions.” Behavioral Sciences of Terrorism and Political Aggression 3 (2): 116–130. doi:10.1080/19434472.2010.512148.
- Jackson, R., E. Murphy, and P. Scott, eds. 2009. Contemporary State Terrorism: Theory and Practice. London: Routledge.
- Johnsen, G. D. 2015. “60 Words and a War without End: The Untold Story of the Most Dangerous Sentence in U.S. History.” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 234–258. New York: IDebate Press.
- Johnston, P. B., and A. K. Sarbahi. 2016. “The Impact of US Drone Strikes on Terrorism in Pakistan.” International Studies Quarterly 60 (2): 203–219. doi:10.1093/isq/sqv004.
- Kaag, J., and S. Kreps. 2015. “The Moral Hazard of Drones.” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 200–220. New York: IDebate Press.
- Kalmoe, N. P. 2013. “From Fistfights to Firefights: Trait Aggression and Support for State Violence.” Political Behavior 35 (2): 311–330. doi:10.1007/s11109-012-9195-z.
- Karimi, F., and E. Burnett. 2015. “Mali Hotel Attack: Gunmen Barged In, Shot at ‘Anything that Moved’.” CNN. November 22. Accessed April 22, 2016. http://www.cnn.com/2015/11/21/africa/mali-hotel-attack/.
- Kaufmann, P. 2011. “Instrumentalization: What Does It Mean to Use a Person?” In Humiliation, Degradation, Dehumanization, edited by P. Kaufmann, H. Kuch, C. Neuhäuser, and E. Webster, 57–66. Berlin: Springer Netherlands.
- Kerstein, S. 2009. “Treating Others Merely as Means.” Utilitas 21 (2): 163–180. doi:10.1017/S0953820809003458.
- Koh, H. H. 2010. “The Obama Administration and International Law.” Annual Meeting of the American Society of International Law, Washington, DC, March 25. Accessed November 16, 2016. http://www.state.gov/s/l/releases/remarks/139119.htm.
- Krause, P. 2013. “The Political Effectiveness of Non-State Violence: A Two-Level Framework to Transform A Deceptive Debate.” Security Studies 22 (2): 259–294. doi:10.1080/09636412.2013.786914.
- Lutz, J. M. 2011. “A Critical View of Critical Terrorism Studies.” Perspectives on Terrorism 4 (6).
- Malle, B., F. Moses, J. Louis, and D. A. Baldwin. 2001. Intentions and Intentionality: Foundations of Social Cognition. Cambridge, MA: MIT press.
- Mayer, J. 2015. “The Predator War: What are the Risks of the C.I.A’s Covert Drone Program?” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 140–162. New York: IDebate Press.
- Moriarty, B. 2015. “Defeating ISIS on Twitter.” Technology Science, September 29. Accessed November 16, 2016. http://jots.pub/a/2015092904/.
- Murer, J. S. 2012. “Ethnic Conflict: An Overview of Analyzing and Framing Communal Conflicts from Comparative Perspectives.” Terrorism and Political Violence 24 (4): 561–580. doi:10.1080/09546553.2012.700614.
- Ori, K. O. 2013. “Conceptualizing Boko Haram: victimage ritual and the construction of Islamic fundamentalism.” M.A. Thesis, Department of Communication Studies, Indiana University.
- Pantucci, R. 2011. “A Typology of Lone Wolves: Preliminary Analysis of Lone Islamist Terrorists.” The International Centre for the Study of Radicalisation and Political Violence, March. Accessed November 19, 2016. http://s3.amazonaws.com/academia.edu.documents/24801864/1302002992icsrpaper_atypologyoflonewolves_pantucci.pdf?AWSAccessKeyId=AKIAJ56TQJRTWSMTNPEA&Expires=1479790915&Signature=EEcnsHY0f9DU%2FjsVqNeRSrv%2FHVc%3D&response-content-disposition=inline%3B%20filename%3DA_typology_of_lone_wolves_preliminary_an.pdf
- Pape, R. A. 2014. Bombing to Win: Air Power and Coercion in War. Ithaca: Cornell University Press.
- Pilkington, Ed. 2015. “Life As a Drone Operator: ‘Ever Step on Ants and Never Give It Another Thought’.” Guardian, November 19. Accessed November 15, 2016. https://www.theguardian.com/world/2015/nov/18/life-as-a-drone-pilot-creech-air-force-base-nevada
- Powell, H. J. 2016. “The Targeted Killing of American Citizens.” Oxford University Press Blog. September 22. Accessed November 20, 2016. http://blog.oup.com/2016/09/targeted-killing-american-citizens/.
- Power, M. 2015. “Confessions of a Drone Warrior.” In Drones and Targeted Killings: Ethics, Law, Politics, edited by S. Knuckey, 163–181. New York: IDebate Press.
- Primoratz, I. 2004. “State Terrorism and Counter-Terrorism.” In Terrorism, edited by I. Primoratz, 113–127. London: Palgrave Macmillan UK.
- Rada, S. E. 1985. “Trans-National Terrorism as Public Relations?” Public Relations Review 11 (3): 26–33. doi:10.1016/S0363-8111(85)80079-5.
- Rapoport, D. 2004. “The Four Waves of Modern Terrorism.” In Attacking Terrorism: Elements of a Grand Strategy, edited by A. K. Cronin and J. M. Ludes, 46–73. Washington, DC: Georgetown University Press.
- Rich, B., and D. Conduit. 2015. “The Impact of Jihadist Foreign Fighters on Indigenous Secular-Nationalist Causes: Contrasting Chechnya and Syria.” Studies in Conflict & Terrorism 38 (2): 113–131.
- Richards, B. 2004. “Terrorism and Public Relations.” Public Relations Review 30 (2): 169–176. doi:10.1016/j.pubrev.2004.02.005.
- Rose, W., R. Murphy, and M. Abrahms. 2007. “Correspondence: Does Terrorism Ever Work? The 2004 Madrid Train Bombings.” International Security 32 (1): 185–192. doi:10.1162/isec.2007.32.1.185.
- Rothenberger, L. 2012. “Terrorist Groups: Using Internet and Social Media for Disseminating Ideas. New Tools for Promoting Political Change.” Revista Română De Comunicare Şi Relaţii Publice 3: 7–23.
- Sànchez-Cuenca, I. 2007. “The Dynamics of Nationalist Terrorism: ETA and the IRA.” Terrorism and Political Violence 19 (3): 289–306. doi:10.1080/09546550701246981.
- Scahill, J. 2013. Dirty Wars: The World Is a Battlefield. New York: Nation Books.
- Scahill, J., R. Devereaux, and C. Currier. 2015. “The Drone Papers.” The Intercept. Accessed December 2, 2015. https://theintercept.com/drone-papers.
- Schmid, A. 2004b. “Terrorism-The Definitional Problem.” Case Western Reserve Journal of International Law 36 (3): 375–419.
- Schmid, A. P. 2004a. “Frameworks for Conceptualising Terrorism.” Terrorism and Political Violence 16 (2): 197–221. doi:10.1080/09546550490483134.
- Stampnitzky, L. 2013. Disciplining Terror: How Experts Invented ‘Terrorism’. Cambridge: Cambridge University Press.
- Stohl, M., and G. A. Lopez, eds. 1984. The State as Terrorist: The Dynamics of Governmental Violence and Repression. Westport, CT: Greenwood Press.
- Stratfor. 2009. “The Terrorist Attack Cycle.” Accessed April 15, 2015. https://wikileaks.org/gifiles/attach/17/17949_.pdf.
- Stratfor. 2012a. “Defining the Terrorist Attack Cycle.” Accessed April 15, 2015. https://www.stratfor.com/sample/image/defining-terrorist-attack-cycle.
- Stratfor. 2012b. “Stratfor on the Terrorist Attack Cycle.” Accessed April 15, 2015. https://www.stratfor.com/video/stratfor-terrorist-attack-cycle.
- Sullivan, M. 2015. “Did Times Underplay Drone Program Leak?” New York Times, October 26. Accessed December 10, 2015. http://publiceditor.blogs.nytimes.com/2015/10/26/did-times-underplay-drone-program-leak/?_r=0.
- Tinnes, J. 2015. “Although the (Dis-) Believers Dislike It: A Backgrounder on IS Hostage Videos – August-December 2014.” Perspectives on Terrorism 9 (1).
- Toros, H., and J. Gunning. 2009. “Exploring a Critical Theory Approach to Terrorism Studies.” In Contemporary State Terrorism: Theory and Practice, edited by R. Jackson, E. Murphy, and S. Poynting, 87–108. London: Routledge.
- Turse, N. 2015. Tomorrow’s Battlefield: US Proxy Wars and Secret Ops in Africa. Johannesburg: Afro-Middle East Centre.
- US (United States). 2013. Procedures for Approving Direct Action against Terrorist Targets Located outside the United States and Areas of Active Hostilities. White House.
- Vanden Brook, T. 2016. “New Rules Allow More Civilian Casualties in Air War against ISIL.” USA Today, April 19. Accessed April 20, 2016. http://www.usatoday.com/story/news/politics/2016/04/19/new-rules-allow-more-civilian-casualties-air-war-against-isil/83190812/?utm_source=Sailthru&utm_medium=email&utm_campaign=New%20Campaign&utm_term=%2ASituation%20Report.
- Vertigan, S. 2008. Terrorism and Societies. Hampshire, UK: Ashgate Publishing.
- Wolf, N. 2013. “Jsoc: Obama’s Secret Assassins.” The Guardian, February 3. Accessed August 10, 2015. http://www.theguardian.com/commentisfree/2013/feb/03/jsoc-obama-secret-assassins.