1 See Jarret Brachman and William McCants, “Stealing Al-Qa’ida’s Playbook,” Studies in Conflict and Terrorism 29, no. 4 (2006): 309–21
2 Barry Posen and Andrew Ross, “Competing Visions for U.S. Grand Strategy,” International Security 21, no. 3 (Winter 1996/97): 5–53
3 The United States has faced domestic rebels in the past, but at least in the 21st century, they have not been a major threat
4 That definition is U.S.-centric. Terrorism as a tactic can be used by any of the groups discussed here. For example, al Qaeda in Iraq consists of rebels who threaten the status quo in Iraq and use terrorism as one of their tactics. In contrast, al Qaeda does not threaten the status quo in the United States, and so it can use terrorism only to directly affect U.S. interests
5 Robert Pape, Bombing to Win: Air Power and Coercion in War (Ithaca, NY: Cornell University Press, 1996)
6 Phil Williams, Drug Trafficking, Violence, and the State in Mexico (Carlisle, PA: Strategic Studies Institute, 2009)
7 Ahmed Rashid, Taliban: Militant Islam, Oil and Fundamentalism in Central Asia, 2nd ed. (New Haven, CT: Yale University Press, 2010)
8 For a more developed critique of the rationale for state building to combat the Taliban, see Joshua Rovner and Austin Long, “Dominoes on the Durand Line? Overcoming Strategic Myths in Afghanistan and Pakistan,” Cato Institute Foreign Policy Briefing no. 92, June 14, 2011
9 On the criminality of al Qaeda in Iraq, see Phil Williams, Criminals, Militias, and Insurgents: Organized Crime in Iraq (Carlisle, PA: Strategic Studies Institute, 2009)
10 On those threats, see Paul Avrich, The Haymarket Tragedy (Princeton, NJ: Princeton University Press, 1986); James P. Muehlberger, The Lost Cause: The Trials of Frank and Jesse James (Yardley, PA: Westholme, 2013); and Robert Utley, The Indian Frontier 1846–1890, rev. ed. (Albuquerque: University of New Mexico Press, 2003)
11 See also Stathis Kalyvas and Laia Baicells, “International System and Technologies of Rebellion: How the End of the Cold War Shaped Internal Conflict,” American Political Science Review 104, no. 3 (August 2010): 415–29
12 On that adjustment, see Kimberly Marten Zisk, Weapons, Culture, and Self-Interest: Soviet Defense Managers in the New Russia (New York: Columbia University Press, 1998); also see Maxim Pyadushkin, with Maria Haug and Anna Matveeva, “Beyond the Kalashnikov: Small Arms Production, Exports, and Stockpiles in the Russian Federation,” Occasional Paper no. 10, Small Arms Survey, August 2003
13 Douglas Farah and Stephen Braun, Merchant of Death: Money, Guns, Planes, and the Man Who Makes War Possible (New York: John Wiley, 2007); Michael Schwirtz, “Russia Denounces U.S. Sentencing of Arms Dealer,” New York Times, April 6, 2012
14 On the diffusion of IEDs, see “Human and Social Forces in the Spread of the IED Threat: Innovation, Diffusion and Adaptation,” START/University of Maryland workshop report, 2009; also see Deak Childress and John Taylor, “A Better Way to Fight IEDs,” Armed Forces Journal, April 2012, pp. 8–11
15 Thomas Johnson and M. Chris Mason, “Understanding the Taliban and Insurgency in Afghanistan,” Orbis 51, no. 1 (Winter 2007): 71–89
16 Robert Pape and James Feldman, Cutting the Fuse: The Explosion of Global Suicide Terrorism and How to Stop It (Chicago: University of Chicago Press, 2010)
17 For a discussion of that theory of diffusion, see Michael Horowitz, The Diffusion of Military Power: Causes and Consequences for International Politics (Princeton, NJ: Princeton University Press, 2010). For a discussion of how terrorist organizations shape individual motives, see Mia Bloom, Dying to Kill: The Allure of Suicide Terror (New York: Columbia University Press, 2007)
18 Rod Norland, “Attacker in Afghanistan Hid Bomb in His Body,” New York Times, June 8, 2013
19 Barry R. Posen, “Command of the Commons: The Military Foundation of U.S. Hegemony,” International Security 28, no. 1 (Summer 2003): 22–36
20 On Mogadishu, see Mark Bowden, Black Hawk Down: A Story of Modern War (New York: Atlantic Monthly Press, 1999). On Afghanistan, see Ray Rivera, Alissa Rubin, and Thom Shanker, “Copter Downed by Taliban Fire; Elite U.S. Unit Among Dead,” New York Times, August 6, 2011
21 See Al Baker and William Rashbaum, “Police Find Car Bomb in Times Square,” New York Times, May 1, 2010; also see Joby Warrick and Sari Horwitz, “Boston Marathon Bombs Had Simple but Harmful Design, Early Clues Indicate,” Washington Post, April 16, 2013
22 Jack Snyder and Erica Borghard, “The Cost of Empty Threats: A Penny, Not a Pound,” American Political Science Review 105, no. 3 (August 2011): 447
23 For an overview of the early Reagan foreign policy, see Gail Yoshitani, Reagan on War: A Reappraisal of the Weinberger Doctrine 1980–1984 (College Station: Texas A&M University Press, 2011)
24 Robert Erikson and Laura Stoker, “Caught in the Draft: The Effects of Vietnam Draft Lottery Status on Political Attitudes,” American Political Science Review 105, no. 2 (May 2011): 221–37
25 See Bernard Rostker, I Want You! The Evolution of the All-Volunteer Force (Santa Monica, CA: RAND Corporation, 2006)
26 See the discussion in Anne Chapman, Origins and Development of the National Training Center, 1976–1984 (Ft. Monroe, VA: U.S. Army Training and Doctrine Command, 1992); also see Suzanne Nielsen, An Army Transformed: The U.S. Army’s Post-Vietnam Recovery and the Dynamics of Change in Military Organizations (Carlisle, PA: Strategic Studies Institute, 2010)
27 See the discussion in Erikson and Stoker, “Caught in the Draft.”
28 See, for example, Mike Pesca, “Military Families React to Sheehan’s Iraq Protest,” National Public Radio, August 17, 2005, http://www.wbur.org/npr/4803815.
29 Petula Dvorak, “Antiwar Fervor Fills the Streets,” Washington Post, September 25, 2005; Katherine Shaver, “D.C. Antiwar March Draws Thousands on Seventh-Anniversary of Iraq Invasion,” Washington Post, March 21, 2010. For a different perspective, see John Mueller, “The Iraq Syndrome,” Foreign Affairs, November–December 2005, pp. 44–54
30 C. R. Anderegg, Sierra Hotel: Flying Air Force Fighters in the Decade after Vietnam (Washington: Air Force History and Museums Program, 2001), chap. 12
31 Jody Sweezey and Austin Long, From Concept to Combat: Tomahawk Cruise Missile Program History and Reference Guide, 1972–2004 (Patuxent River, MD: Naval Air Systems Command, 2005)
32 Michael R. Rip and James M. Hasik, The Precision Revolution: GPS and the Future of Aerial Warfare (Annapolis, MD: Naval Institute Press, 2002)
33 Judy Chizek, “Military Transformation: Intelligence, Surveillance and Reconnaissance,” Congressional Research Service, Report no. RL31425, January 17, 2003; Steve Coll, Ghost Wars: The Secret History of the CIA, Afghanistan and Bin Laden, from the Soviet Invasion to September 10, 2001 (New York: Penguin Books, 2004)
34 For a critical review of the “Afghan model,” see Stephen Biddle, “Allies, Airpower, and Modern Warfare: The Afghan Model in Afghanistan and Iraq,” International Security 30, no. 3 (Winter 2005/6): 161–76
35 Mark Mazzetti, The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth (New York: Penguin Press, 2013)
36 The total number of U.S. Special Operations Command (SOCOM) personnel (which includes staff members as well as operators) is roughly 67,000, whereas the British army end strength was roughly 102,000 in 2012. Over the next six years, the gap in size may narrow as the British army is currently projected to shrink to 82,000, whereas SOCOM will shrink only slightly if at all. See Andrew Feickert, “U.S. Special Operations Forces (SOF): Background and Issues for Congress,” Report no. RS21048, Congressional Research Service, September 18, 2013; also see Philip Ewing, “What’s to Become of the British Army?” DOD Buzz, July 5, 2012
37 This discussion is drawn from Colin Jackson and Austin Long, “The Fifth Service: The Rise of Special Operations Command,” in Harvey Sapolsky, Benjamin Friedman, and Brendan Green, eds., U.S. Military Innovation since the Cold War: Creation without Destruction (New York: Routledge, 2009), pp. 136–54
38 For an overview, see Nicholas Schmidle, “The Mission to Get Bin Laden,” New Yorker, August 8, 2011
39 For a more general articulation of the seduction of the use of force, see Andrew Bacevich, The New American Militarism: How Americans Are Seduced by War (New York: Oxford University Press, 2005)
40 International Crisis Group, “Drones: Myths and Realities in Pakistan,” Asia Report no. 247, May 2013, http://www.crisisgroup.org/en/regions/asia/south-asia/pakistan/247-dron…; Medea Benjamin, Drone Warfare: Killing by Remote Control, rev. ed. (New York: Verso, 2013); Audrey Kurth Cronin, “Why Drones Fail: When Tactics Drive Strategy,” Foreign Affairs, July–August 2013, pp. 44–54. For a more general form of the argument, see David Kilcullen, The Accidental Guerilla: Fighting Small Wars in the Midst of a Big One (New York: Oxford University Press, 2009)
41 See “Opposition to Syrian Airstrikes Surges,” Pew Research, September 9, 2013
42 Stephanie Blum, “Preventive Detention in the War on Terror: A Comparison of How the United States, Britain, and Israel Detain and Incapacitate Terrorist Suspects,” Homeland Security Affairs 4, no. 3 (2008), http://www.hsaj.org/?article=4.3.1.
43 Oversight of the U.S. Justice Department Hearing before the Committee on the Judiciary, United States Senate, 111th Cong., 1st sess., Serial no. J–111–63 (Washington: Government Printing Office, 2009), http://www.gpo.gov/fdsys/pkg/CHRG-111shrg64953/html/CHRG-111shrg64953.h…
44 Benjamin Weiser, Charlie Savage, and Eric Schmitt, “Qaeda Suspect Is Brought to New York for a Hearing,” New York Times, October 14, 2013
45 Brian Michael Jenkins, “Stray Dogs and Virtual Armies: Radicalization and Recruitment to Jihadist Terrorism in the United States since 9/11,” RAND Corporation, 2011, http://www.rand.org/pubs/occasional_papers/OP343.
46 Mark Mazzetti, Charlie Savage, and Scott Shane, “How a U.S. Citizen Came to Be in America’s Cross Hairs,” New York Times, March 9, 2013
47 Greg Miller, “Under Obama, an Emerging Global Apparatus for Drone Killing,” Washington Post, December 27, 2011
48 For a discussion of the capture of Abu Zubaydah in Pakistan, see Scott Shane, “Inside a 9/11 Mastermind’s Interrogation,” New York Times, June 22, 2008
49 Mark Mazzetti and Helene Cooper, “Detective Work on Courier Led to Breakthrough on Bin Laden,” New York Times, May 2, 2011
50 See the discussion in Mark Bowden, Killing Pablo: The Hunt for the World’s Most Dangerous Outlaw (New York: Atlantic Monthly Press, 2001)
51 Joby Warrick, The Triple Agent: The al-Qaeda Mole Who Infiltrated the CIA (New York: Vintage Books, 2012)
52 See the discussion in Austin Long, “Partners or Proxies? U.S. and Host Nation Cooperation in Counterterrorism Operations,” CTC Sentinel 4, no. 11/12 (November 2011): 11–14
53 See Ishaan Tharoor, “Terror in Nairobi: Behind al-Shabab’s War with Kenya,” Time, September 23, 2013
54 See, for example, Sebastian Abbot, “A Glance at the Pakistan-Based Haqqani Network,” Associated Press, September 7, 2012, which notes, “The U.S. intelligence community believes the Haqqani network is focused on attacking local enemies, with no aspirations to attack the United States.”
55 See Warrick, The Triple Agent, pp. 82–88; also see Anne Korblut and Karin Bruillard, “U.S. Blames Pakistani Taliban for Times Square Bomb Plot,” Washington Post, May 10, 2010.
56 Salman Masood, “Pakistani Side Fails to Show Up at Taliban Peace Talks,” New York Times, February 4, 2014.