Skip to main content

Evaluating the Effectiveness of Leadership Decapitation Tactics Against Terrorist Groups

  • Chapter
  • First Online:
Targeting: The Challenges of Modern Warfare
  • 1242 Accesses

Abstract

This chapter examines the effectiveness of leadership decapitation as a counterterrorism tool. Several States have put decapitation tactics—those that seek to kill or capture the leader of an organization—at the forefront of their counterterrorism efforts. However, most of the scholarly work on decapitation suggests it is ineffective at best and counterproductive at worst. Using survival analysis to measure decapitation effectiveness against an original dataset, this chapter shows that decapitation significantly increases the mortality rate (the rate at which groups end) of terrorist groups. The results indicate that the effect of decapitation on terrorist group mortality decreases with the age of the group, even to a point where decapitation may have no effect on the group’s mortality rate, which helps explain the previously perplexing mixed record of decapitation effectiveness. Additionally, this work puts forth a theoretical justification for why terrorist groups are especially susceptible to decapitation tactics and challenges the conventional wisdom regarding terrorist group durability, showing that politically relevant terrorist groups last significantly longer than previously believed.

This is an updated version of the article, Price B (2012) Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism. International Security 36(4):9–46 (reprinted and edited with permission of the author and the publisher).

The views expressed in this chapter do not necessarily reflect those of the US Army or the Department of Defense.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For this study, I defined terrorist groups as organizations consisting of more than one person that engaged in violence with a political purpose that is aimed at evoking a psychological reaction in an audience that extends beyond the targeted victims. My definition does not include ‘lone wolf’ terrorists (e.g., Ted Kaczynski) because my focus is on the organizational dynamics of terrorist organizations.

  2. 2.

    E.g. Colombia (FARC ), Turkey (PKK), Russia (Chechyan groups), France (FLN in Algeria).

  3. 3.

    David (2002, pp. 1–26), David (2003, p. 120), Hafez and Hatfield (2006, pp. 359–382), Ganor (2005, p. 128), Byman (2006, pp. 102–104).

  4. 4.

    Byman 2006, pp. 103–104.

  5. 5.

    Jordan 2009, p. 721; Pape 2003, p. 14.

  6. 6.

    David 2003; Byman 2006 p. 101.

  7. 7.

    Miller 2011.

  8. 8.

    Shane 2010.

  9. 9.

    Mazzetti 2011.

  10. 10.

    Byman 2006, pp. 102–103.

  11. 11.

    Jordan 2009, p. 723; David 2003; Pape 2003, pp. 1–19.

  12. 12.

    Kaplan et al. 2005, pp. 225–235; Ganor 2005, pp. 129–130.

  13. 13.

    Kaplan et al. 2005, p. 230; Cronin 2006, p. 22.

  14. 14.

    For a review of Israel’s long history of targeted killings, see Byman 2006 and David 2002.

  15. 15.

    David 2002, p. 8.

  16. 16.

    Langdon et al. 2004, pp. 59–78; Mannes 2008, pp. 40–49.

  17. 17.

    Cronin 2008, p. 27.

  18. 18.

    Exceptions include (Langdon et al. 2004; Mannes 2008; Jordan 2009).

  19. 19.

    Cronin 2006; Turbiville 2007.

  20. 20.

    Gupta and Mundra 2005, pp. 573–598; Kaplan et al. 2005; Byman 2006.

  21. 21.

    Staniland 2005/2006, pp. 21–40. For an opposing view, see Johnston 2009.

  22. 22.

    Kenney 2007; Hyder 2004.

  23. 23.

    Hosmer 2001; Pape 1996. For an opposing view, see Jones and Olken 2009, pp. 55–87.

  24. 24.

    Grusky 1960, pp. 105–115, 1963, pp. 21–31.

  25. 25.

    Gouldner 1954, pp. 93–113; Lieberson and O’Connor 1972.

  26. 26.

    Zald 1965, pp. 52–60.

  27. 27.

    For an excellent review of the literature on this subject, see Carroll 1984.

  28. 28.

    Ibid., p. 96.

  29. 29.

    One notable exception is Carroll 1984.

  30. 30.

    Langdon et al. 2004, for example, lump terrorist groups, religious organizations, guerrilla, and revolutionary movements into the same study.

  31. 31.

    Pedahzur discusses how violent organizations such as terrorist groups and militaries share this unique cohesion built around dangerous missions, in his book, Suicide Terrorism. Pedahzur 2005, pp. 41–42.

  32. 32.

    Grusky 1960, pp. 105–115.

  33. 33.

    Max Weber referred to these means of authority as the rational (legal or formal) and traditional forms. See Weber 1947.

  34. 34.

    Bahnsen 2001, p. 274.

  35. 35.

    Chasdi 1999.

  36. 36.

    McCormack 2003, pp. 473–507; Eilstrup-Sangiovanni and Jones 2008, pp. 7–44.

  37. 37.

    For an example, consider the Sinjar records about al-Qaeda that were found in Iraq in 2007. See Blanche 2008; Combating Terrorism Center 2014.

  38. 38.

    As one former Navy intelligence analyst noted, ‘[t]errorist organizations do not have organizational charts. They have relationships, and if you can understand those relationships you have gained valuable intelligence’. See Bender 2007.

  39. 39.

    Iqbal and Zorn 2008, pp. 385–400.

  40. 40.

    Galanter and Forest 2006.

  41. 41.

    Kenney 2007, p. 145.

  42. 42.

    Seale 1992.

  43. 43.

    Clarridge 1997, p. 336.

  44. 44.

    Harmon 2007, p. 57.

  45. 45.

    This affects other clandestine organizations such as drug cartels as well. See Hyder 2004, pp. 40–46, specifically for the description of Pablo Escobar’s tenure.

  46. 46.

    Janis 1972.

  47. 47.

    McCormack 2003.

  48. 48.

    Burns 1978.

  49. 49.

    Ibid., at p. 20.

  50. 50.

    Etzioni 1961; House 1977, House and Singh 1987, pp. 669–718; Mumford et al. 2007, pp. 217–235.

  51. 51.

    Aminzade et al. (2001, p. 152).

  52. 52.

    House and Singh 1987, p. 686.

  53. 53.

    House 1977.

  54. 54.

    House and Singh 1987, p. 691.

  55. 55.

    House 1977, p. 204.

  56. 56.

    Shapiro 2007.

  57. 57.

    Crenshaw 1988, p. 19.

  58. 58.

    Ibid.

  59. 59.

    Ibid. See also Crenshaw 1996, p. 263.

  60. 60.

    Weber 1947, pp. 363–373.

  61. 61.

    Dawson 2002, p. 83.

  62. 62.

    Ibid.

  63. 63.

    Terrorist Organization Profiles (TOPS) database available at: http://www.start.umd.edu/tops/.

  64. 64.

    U.S. Customs and Border Protection 2010.

  65. 65.

    Hyder 2004, p. 45.

  66. 66.

    Price 2012.

  67. 67.

    Carroll 1984, p. 6.

  68. 68.

    The dataset, as well as all of the tables, figures, and appendices associated with this article, can be found at http://www.bryancprice.com/Data.html.

  69. 69.

    Some of these groups were founded prior to 1970, but all were active for at least part of the period from 1970 to 2008.

  70. 70.

    My initial criterion consisted of five attacks. Although my results were consistent with the finding using four attacks, my sample size was much larger when I lowered the attack threshold to four.

  71. 71.

    Several datasets in political science employ similar filters. For example, many scholars studying civil wars use coding criteria that include conflicts featuring at least 1000 total deaths and 100 deaths per year. I felt that limiting my dataset to groups that have killed at least one person and have conducted four attacks would be a fair demonstration of organizational capability.

  72. 72.

    Including leaders at all levels would be an improvement over this study, but it is too difficult to accomplish using open source material. I encourage other researchers, particularly those with access to classified information, to include all levels of leadership.

  73. 73.

    For example, the Armed Forces of National Liberation (FALN) was one of several terrorist groups in El Salvador that joined forces to form the Farabundo Marti National Liberation Front (FMLN) in 1980. Because the FMLN conducted attacks under its umbrella name, I included it as a separate group in the dataset with a start date of 1980 and an end date of 1991, when it signed a peace agreement with the government. Instead of coding the FALN’s end date at the time of the merger in 1980, I gave it the same end date as the FMLN in 1991.

  74. 74.

    Two examples of these groups include the Libyan Islamic Fighting Group and the Moroccan Islamic Combatant Group. Both groups are on the 2005 US Foreign Terrorist Organizations list and the United Kingdom’s Proscribed List of terrorist organizations, but they did not have at least four attacks recorded in the Global Terrorism Database (GTD) or MIPT Terrorism Knowledge Base (TKB). Additionally, I utilized left-censoring for any groups with start dates prior to 1970.

  75. 75.

    Supra note 68.

  76. 76.

    The Global Terrorism Database (GTD) is available at http://www.start.umd.edu/gtd/.

  77. 77.

    The MIPT Terrorism Knowledge Base (TKB) can be found at the TOPS database at http://www.start.umd.edu/tops/.

  78. 78.

    Websites operated by the South Asia Terrorism Portal, www.satp.org, and the Northern Ireland Conflict Archive on the Internet (CAIN), http://cain.ulst.ac.uk, as well as the dataset created by RAND scholars Jones and Libicki, were also consulted and cross-checked for accuracy. See Jones and Libicki 2008.

  79. 79.

    It is important to note that starting in 2008, I assume the State knows about the group and therefore targets it even though the group may not have met all of the criteria for inclusion into the dataset in this first year (i.e., conducted at least four attacks and killing at least one person). Some, of course, do meet this criterion. I thank Kenneth Schultz for bringing this to my attention.

  80. 80.

    Supra note 63.

  81. 81.

    Supra note 68.

  82. 82.

    Barnett and McKendrick 2004, pp. 535–571.

  83. 83.

    Jackson 2006, pp. 241–262.

  84. 84.

    Hutchinson and O’Malley 2007.

  85. 85.

    Brian Jackson’s work on the difficulty of characterizing terrorist organizations as purely hierarchical or purely decentralized speaks to this point. Ultimately, it is a question of degree; rarely can one label a group as being purely hierarchical or purely decentralized. Instead, Jackson recommends examining the quality and quantity of a group’s command and control linkages to better understand the structure. This, however, is often difficult to accurately determine as well. For more information, see Jackson 2006.

  86. 86.

    In addition to coding leaders and co-leaders, I coded founders and follow-on leaders in previous work (Price 2009). Although terrorist groups are 70 % more likely to survive when one or more of their founders lead the organization, there is no statistically significant difference between the mortality rates of groups with founders at the helm and those with successor leaders in charge.

  87. 87.

    Hoffman 2002; Cronin 2002/2003, pp. 30–58; Jordan 2009; Mannes 2008.

  88. 88.

    Cronin 2002/2003, pp. 41–42.

  89. 89.

    Hoffman 2002, p. 171.

  90. 90.

    Richardson 2006, p. 48.

  91. 91.

    Post 1990, p. 35.

  92. 92.

    Crenshaw 1988, p. 27.

  93. 93.

    For example, one could argue that the Popular Front for the Liberation of Palestine (PFLP) advocates both nationalist/separatist and Marxist-Leninist ideologies. Hamas is both nationalist and Islamist.

  94. 94.

    Jones and Libicki 2008.

  95. 95.

    As a robustness check, I also ran a Cox model with the ideologies as they were coded in the TOPS dataset. Ideology in this dataset was coded as nine types: anarchist, anti-globalist, socialist/communist, environmental, leftist, nationalist/separatist, racist, religious, right-wing conservative, right-wing reactionary, and other. Because the results exhibited no major changes and because the RAND typologies are easier to comprehend, I used the RAND ideologies.

  96. 96.

    Jordan 2009; Asal and Rethemeyer 2008.

  97. 97.

    Gladwell 2002, p. 180.

  98. 98.

    Jordan 2009; Asal and Rethemeyer 2008.

  99. 99.

    Jones and Libicki 2008.

  100. 100.

    This type of bracketing is a common feature in several academic studies on terrorism. See Mannes 2008; Jones and Libicki 2008.

  101. 101.

    This method is consistent with other works in political science. See, for example, Fearon and Laitin 2003, pp. 75–90. While admittedly an imperfect measure, because no other studies of leadership decapitation have attempted to control for a State’s counterterrorism capability, I felt that using an imperfect measure was better than ignoring the issue. Fortunately, averages were only needed for 37 groups in my dataset (17 %), 11 of which include averaging the counterterrorism capacities of Ireland and the United Kingdom for many of the terrorist groups operating in Northern Ireland.

  102. 102.

    As an example, for al-Qaeda, I used the GDP per capita of the United States, United Kingdom and Pakistan.

  103. 103.

    In Resolution 1373, the UN developed evaluation criteria for State counterterrorism capacity, which obligated member States to revise laws and enhance their law enforcement capability. Additionally, the UN encouraged States to sign and ratify twelve counterterrorism conventions. UNSC Res. 1373, 28 September 2001. The UN’s counterterrorism program, however, suffers from several weaknesses. The resolution contains vague language (e.g., the resolution states that a member State must have ‘the administrative capacity to enforce various counter-terrorism mandates’) and no mechanism for evaluating compliance. According to a report, ‘[e]valuating whether states are actually implementing these conventions and complying with the requirements of Resolution 1373 is a difficult challenge. There are no agreed criteria for evaluating implementation capabilities, or determining what additional steps a state should take to achieve compliance’. See Cortright 2005. Therefore, I did not find compliance with these conventions to be a better measure than GDP per capita.

  104. 104.

    Art and Richardson 2007; Lesser et al. 1999; Wilkinson 2000; Cronin 2006; Zimmerman and Wenger 2007; Enders and Sandler 2006.

  105. 105.

    I thank Martha Crenshaw for pointing this out.

  106. 106.

    Polity IV: Regime Authority Characteristics and Transitions Datasets, Integrated Network for Social Conflict Research (INSCR). Available at: http://www.systemicpeace.org//inscr/inscr.htm.

  107. 107.

    Cronin 2006; Hutchinson and O’Malley 2007.

  108. 108.

    Lotrionte 2003, pp. 73–86; Ganor 2005; Shane 2009; Mazzetti and Shane 2009.

  109. 109.

    Cronin 2008, p. 30.

  110. 110.

    Hutchinson and O’Malley 2007, p. 6.

  111. 111.

    Ganor 2005.

  112. 112.

    Ibid., at p. 128.

  113. 113.

    Ibid.

  114. 114.

    The Cox proportional hazards model is the most widely used model in survival analysis, not only because it can accommodate censored data and time-varying covariates, but also because it is a semi-parametric model that allows researchers to use event history analysis without knowing the exact distribution function of failure times. If a researcher knew that the risk a terrorist group endures from a decapitation event would always increase or decrease with time, then parametric models such as the Weibull model or the exponential model would be preferable. If, however, there is any doubt as to what the distribution function of failure times is, as is the case with terrorist groups and decapitation events, the Cox model is a better choice. See Box-Steffensmeier and Jones 2004, p. 21.

  115. 115.

    Ibid., at pp. 13–14.

  116. 116.

    Ibid., at p. 48.

  117. 117.

    The standard errors reported below the hazard ratios are for the coefficients from which the hazard ratios were derived, not the hazard ratios themselves.

  118. 118.

    This is because Cox models do not have an intercept term. All results are interpreted relative to the baseline hazard rate. For more information, see Therneau and Grambsch 2000.

  119. 119.

    Kaplan=Meier (K-M) estimates are maximum likelihood estimators that allow researchers to approximate survival functions of populations over time, even when individual subjects drop out of the study. In this case, it computes the number of terrorist groups that have ended at a certain point, divided by the number of terrorist groups still remaining in the study.

  120. 120.

    The mean survival time for terrorist groups in this study differs drastically from David C. Rapoport’s widely cited claim that 90 % of all terrorist groups survive less than a year, with nearly half of the remaining groups unable to survive more than a decade. See Rapoport 1992, p. 1067. Many scholars, including top names in the field, have referenced this estimate so much that it has become the conventional wisdom. Rapoport did not include any empirical evidence to support his claim, however. In his defence, his sentence reads: ‘Perhaps as many as 90 % last less than a year’ (emphasis added), which leads me to believe he never intended it to be taken as a bold empirical fact. Although it is possible that his estimate is correct if one considers the overly inclusive number of politically inconsequential groups that have committed few, if any attacks, or in some cases, only threatened attacks, this does not give policymakers an accurate assessment of the durability of politically relevant terrorist groups.

  121. 121.

    Horowitz 2010.

  122. 122.

    Jordan 2009, p. 727.

  123. 123.

    Ganor 2005; Hafez and Hatfield 2006.

  124. 124.

    Brachman and McCants 2006; Shapiro 2007; Felter 2007.

  125. 125.

    Sheridan 2011.

  126. 126.

    Ibid.

  127. 127.

    Sageman 2008.

  128. 128.

    Gorman and Entous 2011, p. 1.

  129. 129.

    Sheridan 2011.

  130. 130.

    Lahoud 2013.

  131. 131.

    Wright 2006, p. 217.

  132. 132.

    Jordan 2009, p. 754.

  133. 133.

    Ibid., at p. 723.

References

  • Aminzade RA, Goldstone JA, Perry EJ (2001) Leadership dynamics and dynamics of contention. In: Aminzade RA, Goldstone JA, McAdam D, Perry EJ, Sewell WH, Tarrow S, Tilly C (eds) Silence and voice in the study of contentious politics. Cambridge University Press, New York, pp 126–154

    Chapter  Google Scholar 

  • Art RJ, Richardson L (2007) Democracy and counterterrorism lessons from the past. United States Institute of Peace Press, Washington DC

    Google Scholar 

  • Asal V, Rethemeyer RK (2008) The nature of the beast: organizational structures and the lethality of terrorist attacks. J Polit 70(2):437–449

    Article  Google Scholar 

  • Bahnsen JC (2001) Charisma. In: Kolenda C (ed) Leadership: the warrior’s art. Army War College Foundational Press, Carlisle, pp 259–276

    Google Scholar 

  • Barnett WP, McKendrick DG (2004) Why are some organizations more competitive than others? Evidence from a changing global market. Adm Sci Q 49(4):535–571

    Google Scholar 

  • Bender B (2007) Antiterrorism agency taps Boston-area brains. Boston Globe, 28 Mar 2007

    Google Scholar 

  • Blanche E (2008) An Al Qaeda rolodex. Middle East 387:6

    Google Scholar 

  • Box-Steffensmeier JM, Jones BS (2004) Event history modeling: a guide for social sciences. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • Brachman JM, McCants WF (2006) Stealing Al-Qa’ida’s playbook. Combating Terrorism Center, West Point

    Google Scholar 

  • Burns JM (1978) Leadership. Harper and Row, New York

    Google Scholar 

  • Byman D (2006) Do targeted killings work? Foreign Affairs 85(2):95–111

    Article  Google Scholar 

  • Carroll G (1984) Dynamics of publisher succession in newspaper organizations. Administrative Sciences Quarterly 29(1):93–113

    Article  Google Scholar 

  • Chasdi RJ (1999) Serenade of suffering: a portrait of Middle East terrorism, 1968–1993. Lexington, Lanham, Md

    Google Scholar 

  • Clarridge DR (1997) A spy for all seasons. Scribner, New York

    Google Scholar 

  • Combating Terrorism Center (2014) Harmony program. http://www.ctc.usma.edu/programs-resources/harmony-program. Accessed 20 Jan 2014

  • Cortright DA (2005) A critical evaluation of the UN counter-terrorism program: accomplishments and challenges. In: Global enforcement regimes transnational organized crime, international terrorism, and money laundering. Transnational Institute, Amsterdam

    Google Scholar 

  • Crenshaw M (1988) The subjective reality of the terrorist: ideological and psychological factors in terrorism. In: Slater RO, Stohl M (eds) Current perspectives on international terrorism. Macmillan, Hong Kong, pp 12–46

    Chapter  Google Scholar 

  • Crenshaw M (1996) Why violence is rejected or renounced: a case study of oppositional terrorism. In: Gregor T (ed) A natural history of peace. Vanderbilt University Press, Nashville, pp 249–272

    Google Scholar 

  • Cronin AK (2002/2003) Behind the curve. Int Secur 27(3):30–58

    Google Scholar 

  • Cronin AK (2006) How al-Qaida ends: the decline and demise of terrorist groups. Int Secur 31(1):7–48

    Article  Google Scholar 

  • Cronin AK (2008) Ending terrorism: lessons for defeating al-Qaeda. Routledge, London

    Google Scholar 

  • David S (2002) Fatal choices: Israel’s policy of targeted killings. Mideast Secur Policy Stud 51:1–26

    Google Scholar 

  • David S (2003) Israel’s policy of targeted killings. Ethics Int Aff 17(1):111–126

    Article  Google Scholar 

  • Dawson LL (2002) Crises of charismatic legitimacy and violent behavior in new religious movements. In: Bromley DG, Melton JG (eds) Cults, religion, and violence. Cambridge University Press, Cambridge, pp 80–102

    Chapter  Google Scholar 

  • Eilstrup-Sangiovanni M, Jones C (2008) Assessing the dangers of illicit networks: why al-Qaida may be less threatening than many think. Int Secur 33(2):7–44

    Article  Google Scholar 

  • Enders W, Sandler T (2006) The political economy of terrorism. Cambridge University Press, New York

    Google Scholar 

  • Etzioni A (1961) A comparative analysis of complex organizations. Free Press, New York

    Google Scholar 

  • Fearon J, Laitin D (2003) Ethnicity, insurgency, and civil war. Am Polit Sci Rev 97:75–90

    Article  Google Scholar 

  • Felter J (2007) Cracks in the foundation: leadership schisms in al-Qa’ida 1989–2006. In: Felter J (ed) Harmony project. Combating Terrorism Center, West Point

    Google Scholar 

  • Galanter M, Forest JJF (2006) Cults, charismatic groups, and social systems: understanding the transformation of terrorist recruits. In: Forest JJF (ed) The making of a terrorist: recruitment, training, and root causes. Praeger, Westport, Conn

    Google Scholar 

  • Ganor B (2005) The counter-terrorism puzzle: a guide for decision makers. Transaction Press, New Brunswick

    Google Scholar 

  • Gladwell M (2002) The tipping point: how little things can make a big difference. Back Bay Books, New York

    Google Scholar 

  • Gouldner A (1954) Patterns of industrial bureaucracy. Free Press, Glencoe, Ill

    Google Scholar 

  • Gorman S, Entous A (2011) Massive intelligence haul. Wall Street J, 4 May 2011

    Google Scholar 

  • Grusky O (1960) Administrative succession in formal organizations. Soc Forces 39(2):105–115

    Article  Google Scholar 

  • Grusky O (1963) Managerial succession and organizational effectiveness. Am J Sociol 69:21–31

    Article  Google Scholar 

  • Gupta D, Mundra K (2005) Suicide bombing as a strategic weapon: an empirical investigation of Hamas and Islamic Jihad. Terrorism Polit Violence 17(4):573–598

    Article  Google Scholar 

  • Hafez M, Hatfield J (2006) Do targeted assassinations work? A multivariate analysis of Israeli-counter-terrorism effectiveness during Al-Aqsa uprising. Stud Conflict Terrorism 29(4):359–382

    Article  Google Scholar 

  • Harmon CC (2007) The myth of the invincible terrorist. Policy Rev 142:57

    Google Scholar 

  • Hoffman B (2002) Inside terrorism. Columbia University Press, New York

    Google Scholar 

  • Horowitz MC (2010) Diffusion of power: causes and consequences for international politics. Princeton University Press, Princeton

    Google Scholar 

  • Hosmer ST (2001) Operations against enemy leaders. RAND, Santa Monica

    Google Scholar 

  • House RJ (1977) A 1976 theory of charismatic leadership. In: Hunt JG, Larson LL (eds) Leadership: the cutting edge. Southern Illinois University Press, Carbondale

    Google Scholar 

  • House RJ, Singh JV (1987) Organizational behavior: some new directions for I/O psychology. Annu Rev Psychol 38:669–718

    Article  Google Scholar 

  • Hutchinson S, O’Malley P (2007) How terrorist groups decline, vol Vol. 2007–1. Canadian Centre for Intelligence and Security Studies, Norman Paterson School of International Affairs, Carleton University, Ottawa

    Google Scholar 

  • Hyder VD (2004) Decapitation operations: criteria for targeting enemy leadership. School of Advanced Military Studies, Fort Leavenworth

    Google Scholar 

  • Iqbal Z, Zorn C (2008) The political consequences of assassination. J Conflict Resolut 52(3):385–400

    Article  Google Scholar 

  • Jackson B (2006) Groups, networks, or movements: a command-and-control-driven approach to classifying terrorist organizations and its application to Al Qaeda. Stud Conflict Terrorism 29(3):241–262

    Article  Google Scholar 

  • Janis IL (1972) Victims of groupthink: a psychological study of foreign-policy decisions and fiascos. Houghton Mifflin, Boston

    Google Scholar 

  • Johnston PB (2009) Does decapitation work? Assessing the effectiveness of leadership targeting in counterinsurgency campaigns. Int Secur 36(4):47–79

    Article  Google Scholar 

  • Jones BF, Olken BA (2009) Hit or miss? The effect of assassinations on institutions and war. Am Econ J Macroecono 1(2):55–87

    Article  Google Scholar 

  • Jones SG, Libicki MC (2008) How terrorist groups end: lessons for countering al Qa’ida. RAND, Santa Monica

    Google Scholar 

  • Jordan J (2009) When heads roll: assessing the effectiveness of leadership decapitation. Secur Stud 18(4):719–755

    Article  Google Scholar 

  • Kaplan E, Mintz A, Mishal S, Samban C (2005) What happened to suicide bombings in Israel? insights from a terror stock model. Stud Conflict Terrorism 28(3):225–235

    Article  Google Scholar 

  • Kenney M (2007) From Pablo to Osama: trafficking and terrorist networks, government bureaucracies, and competitive adaptation. Pennsylvania State University Press, University Park

    Google Scholar 

  • Lahoud N (2013) Jihadi discourse in the wake of the Arab Spring. Combating Terrorism Center, West Point

    Google Scholar 

  • Langdon L, Sarapu AJ, Wells M (2004) Targeting the leadership of terrorist and insurgent movements: historical lessons for contemporary policy makers. J Public Int Aff 15:59–78

    Google Scholar 

  • Lesser IO, Hoffman B, Arquilla J, Ronfeldt D, Zanini M (1999) Countering the new terrorism. RAND, Santa Monica

    Google Scholar 

  • Lieberson S, O’Connor JF (1972) Leadership and organizational performance. Am Sociol Rev 37(2):117–130

    Article  Google Scholar 

  • Lotrionte C (2003) When to target leaders. Wash Q 26(3):73–86

    Article  Google Scholar 

  • Mannes A (2008) Testing the snake head tragedy: does killing or capturing its leaders reduce a terrorist group’s activity? J Int Policy Solutions 9:40–49

    Google Scholar 

  • Mazzetti M (2011) Drone strike in Yemen was aimed at Awlaki. New York Times, 7 May 2011

    Google Scholar 

  • Mazzetti M, Shane S (2009) CIA had plans to assassinate Qaeda leaders. New York Times, 14 July 2009

    Google Scholar 

  • McCormack GH (2003) Terrorist decision making. Annu Rev Polit Sci 6:473–507

    Article  Google Scholar 

  • Miller G (2011) Under Obama, an emerging global apparatus for drone killing. Washington Post, 27 Dec 2011

    Google Scholar 

  • Mumford MM, Espejo J, Hunter S, Bedell-Avers KE, Eubanks DL, Connelly S (2007) The sources of leader violence: a comparison of ideological and non-ideological leaders. Leadersh Q 18(3):217–235

    Article  Google Scholar 

  • Pape R (1996) Bombing to win: air power and coercion in war. Cornell University Press, Ithaca

    Google Scholar 

  • Pape R (2003) The strategic logic of suicide terrorism. Am Polit Sci Rev 97(3):343–361

    Article  Google Scholar 

  • Pedahzur A (2005) Suicide terrorism. Polity, London

    Google Scholar 

  • Post JM (1990) Terrorist psycho-logic: terrorist behavior as a product of psychological forces. In: Reich W (ed) Origins of terrorism. Woodrow Wilson Center Press, Washington, pp 25–42

    Google Scholar 

  • Price B (2009) Removing the devil you know: unraveling the puzzle behind leadership decapitation and terrorist group duration. Ph.D. dissertation, Stanford University, Stanford

    Google Scholar 

  • Price B (2012) Targeting top terrorists: how leadership decapitation contributes to counterterrorism. Int Secur 36(4):9–46

    Article  Google Scholar 

  • Rapoport DC (1992) Terrorism. In: Hawkesworth M, Kogan M (eds) Encyclopedia of government and politics. Routledge, London, pp 1049–1080

    Google Scholar 

  • Richardson L (2006) What terrorists want: understanding the enemy, containing the threat. Random House, New York

    Google Scholar 

  • Sageman M (2008) Leaderless jihad: terror networks in the twenty-first century. Pennsylvania State Press, Philadelphia

    Book  Google Scholar 

  • Seale P (1992) Abu Nidal: a gun for hire. Hutchinson, London

    Google Scholar 

  • Shane S (2009) Government hit squads, minus the hits. New York Times, 19 July 2009

    Google Scholar 

  • Shane S (2010) U.S. approves targeted killing of American cleric. New York Times, 6 Apr 2010

    Google Scholar 

  • Shapiro JN (2007) The terrorist’s challenge: security, efficiency, and control. Ph.D. dissertation, Stanford University, Stanford

    Google Scholar 

  • Sheridan MB (2011) Zawahiri named new al-Qaeda leader. Washington Post, 16 July 2011

    Google Scholar 

  • Staniland P (2005/2006) Defeating transnational insurgencies: the best offense is a good fence. Wash Q 29(1):21–40

    Google Scholar 

  • Therneau TM, Grambsch PM (2000) Modeling survival data: extending the Cox Model. Springer, New York

    Book  Google Scholar 

  • Turbiville, GH Jr (2007) Hunting leadership targets in counterinsurgency and counterterrorist operations: selected perspectives and experience. Joint Special Operations University Report, No. 07-6 Joint Special Operations University, Hurlburt Field

    Google Scholar 

  • U.S. Customs and Border Protection (2010) Drug trafficking organizations adaptability to smuggle drugs across SWB after losing key personnel. info.publicintelligence.net/CBP-NoChangeDTOs.pdf. Accessed 5 Jan 2011

    Google Scholar 

  • Weber M (1947) The theory of social and economic organizations. Free Press, New York

    Google Scholar 

  • Wilkinson P (2000) Terrorism versus democracy. Frank Cass Publishers, London

    Google Scholar 

  • Wright L (2006) The looming tower: al-Qaeda and the road to 9/11. Knopf, New York

    Google Scholar 

  • Zald MN (1965) Who shall rule? A political analysis of succession in a large welfare organization. Pac Sociol Rev 8(1):52–60

    Article  Google Scholar 

  • Zimmerman D, Wenger A (2007) How States fight terrorism: policy dynamics in the west. Lynne Rien Publishers, London

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bryan Price .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 T.M.C. Asser Press and the authors

About this chapter

Cite this chapter

Price, B. (2016). Evaluating the Effectiveness of Leadership Decapitation Tactics Against Terrorist Groups. In: Ducheine, P., Schmitt, M., Osinga, F. (eds) Targeting: The Challenges of Modern Warfare. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-072-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-94-6265-072-5_12

  • Published:

  • Publisher Name: T.M.C. Asser Press, The Hague

  • Print ISBN: 978-94-6265-071-8

  • Online ISBN: 978-94-6265-072-5

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics

Societies and partnerships