Abstract
This chapter examines the effectiveness of leadership decapitation as a counterterrorism tool. Several States have put decapitation tactics—those that seek to kill or capture the leader of an organization—at the forefront of their counterterrorism efforts. However, most of the scholarly work on decapitation suggests it is ineffective at best and counterproductive at worst. Using survival analysis to measure decapitation effectiveness against an original dataset, this chapter shows that decapitation significantly increases the mortality rate (the rate at which groups end) of terrorist groups. The results indicate that the effect of decapitation on terrorist group mortality decreases with the age of the group, even to a point where decapitation may have no effect on the group’s mortality rate, which helps explain the previously perplexing mixed record of decapitation effectiveness. Additionally, this work puts forth a theoretical justification for why terrorist groups are especially susceptible to decapitation tactics and challenges the conventional wisdom regarding terrorist group durability, showing that politically relevant terrorist groups last significantly longer than previously believed.
This is an updated version of the article, Price B (2012) Targeting Top Terrorists: How Leadership Decapitation Contributes to Counterterrorism. International Security 36(4):9–46 (reprinted and edited with permission of the author and the publisher).
The views expressed in this chapter do not necessarily reflect those of the US Army or the Department of Defense.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
For this study, I defined terrorist groups as organizations consisting of more than one person that engaged in violence with a political purpose that is aimed at evoking a psychological reaction in an audience that extends beyond the targeted victims. My definition does not include ‘lone wolf’ terrorists (e.g., Ted Kaczynski) because my focus is on the organizational dynamics of terrorist organizations.
- 2.
E.g. Colombia (FARC ), Turkey (PKK), Russia (Chechyan groups), France (FLN in Algeria).
- 3.
- 4.
Byman 2006, pp. 103–104.
- 5.
- 6.
- 7.
Miller 2011.
- 8.
Shane 2010.
- 9.
Mazzetti 2011.
- 10.
Byman 2006, pp. 102–103.
- 11.
- 12.
- 13.
- 14.
- 15.
David 2002, p. 8.
- 16.
- 17.
Cronin 2008, p. 27.
- 18.
- 19.
- 20.
- 21.
- 22.
- 23.
- 24.
- 25.
- 26.
Zald 1965, pp. 52–60.
- 27.
For an excellent review of the literature on this subject, see Carroll 1984.
- 28.
Ibid., p. 96.
- 29.
One notable exception is Carroll 1984.
- 30.
Langdon et al. 2004, for example, lump terrorist groups, religious organizations, guerrilla, and revolutionary movements into the same study.
- 31.
Pedahzur discusses how violent organizations such as terrorist groups and militaries share this unique cohesion built around dangerous missions, in his book, Suicide Terrorism. Pedahzur 2005, pp. 41–42.
- 32.
Grusky 1960, pp. 105–115.
- 33.
Max Weber referred to these means of authority as the rational (legal or formal) and traditional forms. See Weber 1947.
- 34.
Bahnsen 2001, p. 274.
- 35.
Chasdi 1999.
- 36.
- 37.
- 38.
As one former Navy intelligence analyst noted, ‘[t]errorist organizations do not have organizational charts. They have relationships, and if you can understand those relationships you have gained valuable intelligence’. See Bender 2007.
- 39.
Iqbal and Zorn 2008, pp. 385–400.
- 40.
Galanter and Forest 2006.
- 41.
Kenney 2007, p. 145.
- 42.
Seale 1992.
- 43.
Clarridge 1997, p. 336.
- 44.
Harmon 2007, p. 57.
- 45.
This affects other clandestine organizations such as drug cartels as well. See Hyder 2004, pp. 40–46, specifically for the description of Pablo Escobar’s tenure.
- 46.
Janis 1972.
- 47.
McCormack 2003.
- 48.
Burns 1978.
- 49.
Ibid., at p. 20.
- 50.
- 51.
Aminzade et al. (2001, p. 152).
- 52.
House and Singh 1987, p. 686.
- 53.
House 1977.
- 54.
House and Singh 1987, p. 691.
- 55.
House 1977, p. 204.
- 56.
Shapiro 2007.
- 57.
Crenshaw 1988, p. 19.
- 58.
Ibid.
- 59.
Ibid. See also Crenshaw 1996, p. 263.
- 60.
Weber 1947, pp. 363–373.
- 61.
Dawson 2002, p. 83.
- 62.
Ibid.
- 63.
Terrorist Organization Profiles (TOPS) database available at: http://www.start.umd.edu/tops/.
- 64.
U.S. Customs and Border Protection 2010.
- 65.
Hyder 2004, p. 45.
- 66.
Price 2012.
- 67.
Carroll 1984, p. 6.
- 68.
The dataset, as well as all of the tables, figures, and appendices associated with this article, can be found at http://www.bryancprice.com/Data.html.
- 69.
Some of these groups were founded prior to 1970, but all were active for at least part of the period from 1970 to 2008.
- 70.
My initial criterion consisted of five attacks. Although my results were consistent with the finding using four attacks, my sample size was much larger when I lowered the attack threshold to four.
- 71.
Several datasets in political science employ similar filters. For example, many scholars studying civil wars use coding criteria that include conflicts featuring at least 1000 total deaths and 100 deaths per year. I felt that limiting my dataset to groups that have killed at least one person and have conducted four attacks would be a fair demonstration of organizational capability.
- 72.
Including leaders at all levels would be an improvement over this study, but it is too difficult to accomplish using open source material. I encourage other researchers, particularly those with access to classified information, to include all levels of leadership.
- 73.
For example, the Armed Forces of National Liberation (FALN) was one of several terrorist groups in El Salvador that joined forces to form the Farabundo Marti National Liberation Front (FMLN) in 1980. Because the FMLN conducted attacks under its umbrella name, I included it as a separate group in the dataset with a start date of 1980 and an end date of 1991, when it signed a peace agreement with the government. Instead of coding the FALN’s end date at the time of the merger in 1980, I gave it the same end date as the FMLN in 1991.
- 74.
Two examples of these groups include the Libyan Islamic Fighting Group and the Moroccan Islamic Combatant Group. Both groups are on the 2005 US Foreign Terrorist Organizations list and the United Kingdom’s Proscribed List of terrorist organizations, but they did not have at least four attacks recorded in the Global Terrorism Database (GTD) or MIPT Terrorism Knowledge Base (TKB). Additionally, I utilized left-censoring for any groups with start dates prior to 1970.
- 75.
Supra note 68.
- 76.
The Global Terrorism Database (GTD) is available at http://www.start.umd.edu/gtd/.
- 77.
The MIPT Terrorism Knowledge Base (TKB) can be found at the TOPS database at http://www.start.umd.edu/tops/.
- 78.
Websites operated by the South Asia Terrorism Portal, www.satp.org, and the Northern Ireland Conflict Archive on the Internet (CAIN), http://cain.ulst.ac.uk, as well as the dataset created by RAND scholars Jones and Libicki, were also consulted and cross-checked for accuracy. See Jones and Libicki 2008.
- 79.
It is important to note that starting in 2008, I assume the State knows about the group and therefore targets it even though the group may not have met all of the criteria for inclusion into the dataset in this first year (i.e., conducted at least four attacks and killing at least one person). Some, of course, do meet this criterion. I thank Kenneth Schultz for bringing this to my attention.
- 80.
Supra note 63.
- 81.
Supra note 68.
- 82.
Barnett and McKendrick 2004, pp. 535–571.
- 83.
Jackson 2006, pp. 241–262.
- 84.
Hutchinson and O’Malley 2007.
- 85.
Brian Jackson’s work on the difficulty of characterizing terrorist organizations as purely hierarchical or purely decentralized speaks to this point. Ultimately, it is a question of degree; rarely can one label a group as being purely hierarchical or purely decentralized. Instead, Jackson recommends examining the quality and quantity of a group’s command and control linkages to better understand the structure. This, however, is often difficult to accurately determine as well. For more information, see Jackson 2006.
- 86.
In addition to coding leaders and co-leaders, I coded founders and follow-on leaders in previous work (Price 2009). Although terrorist groups are 70 % more likely to survive when one or more of their founders lead the organization, there is no statistically significant difference between the mortality rates of groups with founders at the helm and those with successor leaders in charge.
- 87.
- 88.
Cronin 2002/2003, pp. 41–42.
- 89.
Hoffman 2002, p. 171.
- 90.
Richardson 2006, p. 48.
- 91.
Post 1990, p. 35.
- 92.
Crenshaw 1988, p. 27.
- 93.
For example, one could argue that the Popular Front for the Liberation of Palestine (PFLP) advocates both nationalist/separatist and Marxist-Leninist ideologies. Hamas is both nationalist and Islamist.
- 94.
Jones and Libicki 2008.
- 95.
As a robustness check, I also ran a Cox model with the ideologies as they were coded in the TOPS dataset. Ideology in this dataset was coded as nine types: anarchist, anti-globalist, socialist/communist, environmental, leftist, nationalist/separatist, racist, religious, right-wing conservative, right-wing reactionary, and other. Because the results exhibited no major changes and because the RAND typologies are easier to comprehend, I used the RAND ideologies.
- 96.
- 97.
Gladwell 2002, p. 180.
- 98.
- 99.
Jones and Libicki 2008.
- 100.
- 101.
This method is consistent with other works in political science. See, for example, Fearon and Laitin 2003, pp. 75–90. While admittedly an imperfect measure, because no other studies of leadership decapitation have attempted to control for a State’s counterterrorism capability, I felt that using an imperfect measure was better than ignoring the issue. Fortunately, averages were only needed for 37 groups in my dataset (17 %), 11 of which include averaging the counterterrorism capacities of Ireland and the United Kingdom for many of the terrorist groups operating in Northern Ireland.
- 102.
As an example, for al-Qaeda, I used the GDP per capita of the United States, United Kingdom and Pakistan.
- 103.
In Resolution 1373, the UN developed evaluation criteria for State counterterrorism capacity, which obligated member States to revise laws and enhance their law enforcement capability. Additionally, the UN encouraged States to sign and ratify twelve counterterrorism conventions. UNSC Res. 1373, 28 September 2001. The UN’s counterterrorism program, however, suffers from several weaknesses. The resolution contains vague language (e.g., the resolution states that a member State must have ‘the administrative capacity to enforce various counter-terrorism mandates’) and no mechanism for evaluating compliance. According to a report, ‘[e]valuating whether states are actually implementing these conventions and complying with the requirements of Resolution 1373 is a difficult challenge. There are no agreed criteria for evaluating implementation capabilities, or determining what additional steps a state should take to achieve compliance’. See Cortright 2005. Therefore, I did not find compliance with these conventions to be a better measure than GDP per capita.
- 104.
- 105.
I thank Martha Crenshaw for pointing this out.
- 106.
Polity IV: Regime Authority Characteristics and Transitions Datasets, Integrated Network for Social Conflict Research (INSCR). Available at: http://www.systemicpeace.org//inscr/inscr.htm.
- 107.
- 108.
- 109.
Cronin 2008, p. 30.
- 110.
Hutchinson and O’Malley 2007, p. 6.
- 111.
Ganor 2005.
- 112.
Ibid., at p. 128.
- 113.
Ibid.
- 114.
The Cox proportional hazards model is the most widely used model in survival analysis, not only because it can accommodate censored data and time-varying covariates, but also because it is a semi-parametric model that allows researchers to use event history analysis without knowing the exact distribution function of failure times. If a researcher knew that the risk a terrorist group endures from a decapitation event would always increase or decrease with time, then parametric models such as the Weibull model or the exponential model would be preferable. If, however, there is any doubt as to what the distribution function of failure times is, as is the case with terrorist groups and decapitation events, the Cox model is a better choice. See Box-Steffensmeier and Jones 2004, p. 21.
- 115.
Ibid., at pp. 13–14.
- 116.
Ibid., at p. 48.
- 117.
The standard errors reported below the hazard ratios are for the coefficients from which the hazard ratios were derived, not the hazard ratios themselves.
- 118.
This is because Cox models do not have an intercept term. All results are interpreted relative to the baseline hazard rate. For more information, see Therneau and Grambsch 2000.
- 119.
Kaplan=Meier (K-M) estimates are maximum likelihood estimators that allow researchers to approximate survival functions of populations over time, even when individual subjects drop out of the study. In this case, it computes the number of terrorist groups that have ended at a certain point, divided by the number of terrorist groups still remaining in the study.
- 120.
The mean survival time for terrorist groups in this study differs drastically from David C. Rapoport’s widely cited claim that 90 % of all terrorist groups survive less than a year, with nearly half of the remaining groups unable to survive more than a decade. See Rapoport 1992, p. 1067. Many scholars, including top names in the field, have referenced this estimate so much that it has become the conventional wisdom. Rapoport did not include any empirical evidence to support his claim, however. In his defence, his sentence reads: ‘Perhaps as many as 90 % last less than a year’ (emphasis added), which leads me to believe he never intended it to be taken as a bold empirical fact. Although it is possible that his estimate is correct if one considers the overly inclusive number of politically inconsequential groups that have committed few, if any attacks, or in some cases, only threatened attacks, this does not give policymakers an accurate assessment of the durability of politically relevant terrorist groups.
- 121.
Horowitz 2010.
- 122.
Jordan 2009, p. 727.
- 123.
- 124.
- 125.
Sheridan 2011.
- 126.
Ibid.
- 127.
Sageman 2008.
- 128.
Gorman and Entous 2011, p. 1.
- 129.
Sheridan 2011.
- 130.
Lahoud 2013.
- 131.
Wright 2006, p. 217.
- 132.
Jordan 2009, p. 754.
- 133.
Ibid., at p. 723.
References
Aminzade RA, Goldstone JA, Perry EJ (2001) Leadership dynamics and dynamics of contention. In: Aminzade RA, Goldstone JA, McAdam D, Perry EJ, Sewell WH, Tarrow S, Tilly C (eds) Silence and voice in the study of contentious politics. Cambridge University Press, New York, pp 126–154
Art RJ, Richardson L (2007) Democracy and counterterrorism lessons from the past. United States Institute of Peace Press, Washington DC
Asal V, Rethemeyer RK (2008) The nature of the beast: organizational structures and the lethality of terrorist attacks. J Polit 70(2):437–449
Bahnsen JC (2001) Charisma. In: Kolenda C (ed) Leadership: the warrior’s art. Army War College Foundational Press, Carlisle, pp 259–276
Barnett WP, McKendrick DG (2004) Why are some organizations more competitive than others? Evidence from a changing global market. Adm Sci Q 49(4):535–571
Bender B (2007) Antiterrorism agency taps Boston-area brains. Boston Globe, 28 Mar 2007
Blanche E (2008) An Al Qaeda rolodex. Middle East 387:6
Box-Steffensmeier JM, Jones BS (2004) Event history modeling: a guide for social sciences. Cambridge University Press, Cambridge
Brachman JM, McCants WF (2006) Stealing Al-Qa’ida’s playbook. Combating Terrorism Center, West Point
Burns JM (1978) Leadership. Harper and Row, New York
Byman D (2006) Do targeted killings work? Foreign Affairs 85(2):95–111
Carroll G (1984) Dynamics of publisher succession in newspaper organizations. Administrative Sciences Quarterly 29(1):93–113
Chasdi RJ (1999) Serenade of suffering: a portrait of Middle East terrorism, 1968–1993. Lexington, Lanham, Md
Clarridge DR (1997) A spy for all seasons. Scribner, New York
Combating Terrorism Center (2014) Harmony program. http://www.ctc.usma.edu/programs-resources/harmony-program. Accessed 20 Jan 2014
Cortright DA (2005) A critical evaluation of the UN counter-terrorism program: accomplishments and challenges. In: Global enforcement regimes transnational organized crime, international terrorism, and money laundering. Transnational Institute, Amsterdam
Crenshaw M (1988) The subjective reality of the terrorist: ideological and psychological factors in terrorism. In: Slater RO, Stohl M (eds) Current perspectives on international terrorism. Macmillan, Hong Kong, pp 12–46
Crenshaw M (1996) Why violence is rejected or renounced: a case study of oppositional terrorism. In: Gregor T (ed) A natural history of peace. Vanderbilt University Press, Nashville, pp 249–272
Cronin AK (2002/2003) Behind the curve. Int Secur 27(3):30–58
Cronin AK (2006) How al-Qaida ends: the decline and demise of terrorist groups. Int Secur 31(1):7–48
Cronin AK (2008) Ending terrorism: lessons for defeating al-Qaeda. Routledge, London
David S (2002) Fatal choices: Israel’s policy of targeted killings. Mideast Secur Policy Stud 51:1–26
David S (2003) Israel’s policy of targeted killings. Ethics Int Aff 17(1):111–126
Dawson LL (2002) Crises of charismatic legitimacy and violent behavior in new religious movements. In: Bromley DG, Melton JG (eds) Cults, religion, and violence. Cambridge University Press, Cambridge, pp 80–102
Eilstrup-Sangiovanni M, Jones C (2008) Assessing the dangers of illicit networks: why al-Qaida may be less threatening than many think. Int Secur 33(2):7–44
Enders W, Sandler T (2006) The political economy of terrorism. Cambridge University Press, New York
Etzioni A (1961) A comparative analysis of complex organizations. Free Press, New York
Fearon J, Laitin D (2003) Ethnicity, insurgency, and civil war. Am Polit Sci Rev 97:75–90
Felter J (2007) Cracks in the foundation: leadership schisms in al-Qa’ida 1989–2006. In: Felter J (ed) Harmony project. Combating Terrorism Center, West Point
Galanter M, Forest JJF (2006) Cults, charismatic groups, and social systems: understanding the transformation of terrorist recruits. In: Forest JJF (ed) The making of a terrorist: recruitment, training, and root causes. Praeger, Westport, Conn
Ganor B (2005) The counter-terrorism puzzle: a guide for decision makers. Transaction Press, New Brunswick
Gladwell M (2002) The tipping point: how little things can make a big difference. Back Bay Books, New York
Gouldner A (1954) Patterns of industrial bureaucracy. Free Press, Glencoe, Ill
Gorman S, Entous A (2011) Massive intelligence haul. Wall Street J, 4 May 2011
Grusky O (1960) Administrative succession in formal organizations. Soc Forces 39(2):105–115
Grusky O (1963) Managerial succession and organizational effectiveness. Am J Sociol 69:21–31
Gupta D, Mundra K (2005) Suicide bombing as a strategic weapon: an empirical investigation of Hamas and Islamic Jihad. Terrorism Polit Violence 17(4):573–598
Hafez M, Hatfield J (2006) Do targeted assassinations work? A multivariate analysis of Israeli-counter-terrorism effectiveness during Al-Aqsa uprising. Stud Conflict Terrorism 29(4):359–382
Harmon CC (2007) The myth of the invincible terrorist. Policy Rev 142:57
Hoffman B (2002) Inside terrorism. Columbia University Press, New York
Horowitz MC (2010) Diffusion of power: causes and consequences for international politics. Princeton University Press, Princeton
Hosmer ST (2001) Operations against enemy leaders. RAND, Santa Monica
House RJ (1977) A 1976 theory of charismatic leadership. In: Hunt JG, Larson LL (eds) Leadership: the cutting edge. Southern Illinois University Press, Carbondale
House RJ, Singh JV (1987) Organizational behavior: some new directions for I/O psychology. Annu Rev Psychol 38:669–718
Hutchinson S, O’Malley P (2007) How terrorist groups decline, vol Vol. 2007–1. Canadian Centre for Intelligence and Security Studies, Norman Paterson School of International Affairs, Carleton University, Ottawa
Hyder VD (2004) Decapitation operations: criteria for targeting enemy leadership. School of Advanced Military Studies, Fort Leavenworth
Iqbal Z, Zorn C (2008) The political consequences of assassination. J Conflict Resolut 52(3):385–400
Jackson B (2006) Groups, networks, or movements: a command-and-control-driven approach to classifying terrorist organizations and its application to Al Qaeda. Stud Conflict Terrorism 29(3):241–262
Janis IL (1972) Victims of groupthink: a psychological study of foreign-policy decisions and fiascos. Houghton Mifflin, Boston
Johnston PB (2009) Does decapitation work? Assessing the effectiveness of leadership targeting in counterinsurgency campaigns. Int Secur 36(4):47–79
Jones BF, Olken BA (2009) Hit or miss? The effect of assassinations on institutions and war. Am Econ J Macroecono 1(2):55–87
Jones SG, Libicki MC (2008) How terrorist groups end: lessons for countering al Qa’ida. RAND, Santa Monica
Jordan J (2009) When heads roll: assessing the effectiveness of leadership decapitation. Secur Stud 18(4):719–755
Kaplan E, Mintz A, Mishal S, Samban C (2005) What happened to suicide bombings in Israel? insights from a terror stock model. Stud Conflict Terrorism 28(3):225–235
Kenney M (2007) From Pablo to Osama: trafficking and terrorist networks, government bureaucracies, and competitive adaptation. Pennsylvania State University Press, University Park
Lahoud N (2013) Jihadi discourse in the wake of the Arab Spring. Combating Terrorism Center, West Point
Langdon L, Sarapu AJ, Wells M (2004) Targeting the leadership of terrorist and insurgent movements: historical lessons for contemporary policy makers. J Public Int Aff 15:59–78
Lesser IO, Hoffman B, Arquilla J, Ronfeldt D, Zanini M (1999) Countering the new terrorism. RAND, Santa Monica
Lieberson S, O’Connor JF (1972) Leadership and organizational performance. Am Sociol Rev 37(2):117–130
Lotrionte C (2003) When to target leaders. Wash Q 26(3):73–86
Mannes A (2008) Testing the snake head tragedy: does killing or capturing its leaders reduce a terrorist group’s activity? J Int Policy Solutions 9:40–49
Mazzetti M (2011) Drone strike in Yemen was aimed at Awlaki. New York Times, 7 May 2011
Mazzetti M, Shane S (2009) CIA had plans to assassinate Qaeda leaders. New York Times, 14 July 2009
McCormack GH (2003) Terrorist decision making. Annu Rev Polit Sci 6:473–507
Miller G (2011) Under Obama, an emerging global apparatus for drone killing. Washington Post, 27 Dec 2011
Mumford MM, Espejo J, Hunter S, Bedell-Avers KE, Eubanks DL, Connelly S (2007) The sources of leader violence: a comparison of ideological and non-ideological leaders. Leadersh Q 18(3):217–235
Pape R (1996) Bombing to win: air power and coercion in war. Cornell University Press, Ithaca
Pape R (2003) The strategic logic of suicide terrorism. Am Polit Sci Rev 97(3):343–361
Pedahzur A (2005) Suicide terrorism. Polity, London
Post JM (1990) Terrorist psycho-logic: terrorist behavior as a product of psychological forces. In: Reich W (ed) Origins of terrorism. Woodrow Wilson Center Press, Washington, pp 25–42
Price B (2009) Removing the devil you know: unraveling the puzzle behind leadership decapitation and terrorist group duration. Ph.D. dissertation, Stanford University, Stanford
Price B (2012) Targeting top terrorists: how leadership decapitation contributes to counterterrorism. Int Secur 36(4):9–46
Rapoport DC (1992) Terrorism. In: Hawkesworth M, Kogan M (eds) Encyclopedia of government and politics. Routledge, London, pp 1049–1080
Richardson L (2006) What terrorists want: understanding the enemy, containing the threat. Random House, New York
Sageman M (2008) Leaderless jihad: terror networks in the twenty-first century. Pennsylvania State Press, Philadelphia
Seale P (1992) Abu Nidal: a gun for hire. Hutchinson, London
Shane S (2009) Government hit squads, minus the hits. New York Times, 19 July 2009
Shane S (2010) U.S. approves targeted killing of American cleric. New York Times, 6 Apr 2010
Shapiro JN (2007) The terrorist’s challenge: security, efficiency, and control. Ph.D. dissertation, Stanford University, Stanford
Sheridan MB (2011) Zawahiri named new al-Qaeda leader. Washington Post, 16 July 2011
Staniland P (2005/2006) Defeating transnational insurgencies: the best offense is a good fence. Wash Q 29(1):21–40
Therneau TM, Grambsch PM (2000) Modeling survival data: extending the Cox Model. Springer, New York
Turbiville, GH Jr (2007) Hunting leadership targets in counterinsurgency and counterterrorist operations: selected perspectives and experience. Joint Special Operations University Report, No. 07-6 Joint Special Operations University, Hurlburt Field
U.S. Customs and Border Protection (2010) Drug trafficking organizations adaptability to smuggle drugs across SWB after losing key personnel. info.publicintelligence.net/CBP-NoChangeDTOs.pdf. Accessed 5 Jan 2011
Weber M (1947) The theory of social and economic organizations. Free Press, New York
Wilkinson P (2000) Terrorism versus democracy. Frank Cass Publishers, London
Wright L (2006) The looming tower: al-Qaeda and the road to 9/11. Knopf, New York
Zald MN (1965) Who shall rule? A political analysis of succession in a large welfare organization. Pac Sociol Rev 8(1):52–60
Zimmerman D, Wenger A (2007) How States fight terrorism: policy dynamics in the west. Lynne Rien Publishers, London
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 T.M.C. Asser Press and the authors
About this chapter
Cite this chapter
Price, B. (2016). Evaluating the Effectiveness of Leadership Decapitation Tactics Against Terrorist Groups. In: Ducheine, P., Schmitt, M., Osinga, F. (eds) Targeting: The Challenges of Modern Warfare. T.M.C. Asser Press, The Hague. https://doi.org/10.1007/978-94-6265-072-5_12
Download citation
DOI: https://doi.org/10.1007/978-94-6265-072-5_12
Published:
Publisher Name: T.M.C. Asser Press, The Hague
Print ISBN: 978-94-6265-071-8
Online ISBN: 978-94-6265-072-5
eBook Packages: Law and CriminologyLaw and Criminology (R0)