The Anatomy of Terrorist Groups – אוניברסיטת רייכמן

Interdisciplinary Center (IDC) Herzliya — Lauder School of Government, Diplomacy and Strategy

The Anatomy of Terrorist Groups (24100)
Semester A (2014/2015)

Course Description

This course examines terrorism from an organizational level of analysis. Part I of the course provides a theoretical overview of organizational approaches for analyzing terrorism. Part II traces the life cycle of terrorist groups from their birth to their eventual decline. Topics covered include group structure and logistics; psychological aspects of membership in a terrorist organization; decision-making processes; recruitment and training; and ideology and martyrdom. Part III discusses relationships between terrorist organizations, including competition and cooperation between groups. The final lesson analyzes the relationships between various nodes of the global jihad movement.

ad

Course Logistics

Course meeting time: Thursdays, 19:30–21:00.

Graded Requirements

  • Mid-term paper — 20%
  • Final examination — 80%
  • Total — 100%

Mid-term Examination: Information about the midterm examination and submission date will be given in class and posted on the course website. The final examination covers material from the entire course.

Course Structure

Part I: Terrorist Groups — A Theoretical Introduction

  • Lesson 1: Introduction: Terrorism and Terrorist Groups
  • Lesson 2: Theoretical Approaches to Understanding Terrorist Groups

Part II: Dynamics in Terrorist Groups

  • Lesson 3: How Terrorist Groups Emerge
  • Lesson 4: Structure, Bureaucracy, and Logistics
  • Lesson 5: Psychological Aspects of Terrorist Group Membership
  • Lesson 6: Leadership
  • Lesson 7: Recruitment and Training
  • Lesson 8: Tactics, Technology, and Innovation
  • Lesson 9: Ideology and Martyrdom
  • Lesson 10: Decline and Demise of Terrorist Groups

Part III: Relationships Between Terrorist Groups

  • Lesson 11: Competition Within and Between Terrorist Groups
  • Lesson 12: Cooperation Between Terrorist Groups
  • Lesson 13: The Nexus of Global Jihad

Lesson Schedule

Part I: Terrorist Groups — A Theoretical Introduction

Lesson 1 (Oct 30): Introduction: Terrorism and Terrorist Groups

Required Readings:

  1. Assaf Moghadam, Ronit Berger, and Polina Beliakova, “Say Terrorist, Think Insurgents: Labeling and Analyzing Contemporary Terrorist Actors,” Perspectives on Terrorism, October 2014 (forthcoming).

Recommended Readings:

  1. Audrey Kurth Cronin, “Sources of Contemporary Terrorism,” in Audrey K. Cronin and James M. Ludes, eds., Attacking Terrorism: Elements of a Grand Strategy (Washington, DC: Georgetown University Press, 2004), pp. 19–45.
  2. Anthony Richards, “Conceptualizing Terrorism,” Studies in Conflict and Terrorism 37.3 (March 2014), pp. 213–36.
  3. Bruce Hoffman, Inside Terrorism, revised and expanded edition (New York: Columbia).
  4. Martha Crenshaw, “The Causes of Terrorism,” in Crenshaw, Explaining Terrorism, pp. 34–50.

Lesson 2 (Nov 6): Theoretical Approaches to Understanding Terrorist Groups

Required Readings:

  1. Martha Crenshaw, “Theories of Terrorism: Instrumental and Organizational Approaches,” in David C. Rapoport, ed., Inside Terrorist Organizations (London; Portland: Frank Cass, 2001), 13–31.
  2. Max Abrahms, “What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy,” International Security 32.4 (Spring 2008), pp. 78–105.

Recommended Readings:

  1. Martha Crenshaw, “The Logic of Terrorism,” in Crenshaw, Explaining Terrorism, pp. 111–24.
  2. Martha Crenshaw, “The Organizational Approach,” in Martha Crenshaw, Explaining Terrorism: Causes, Processes and Consequences (Oxon and New York: Routledge, 2011), pp. 69–87.
  3. Gordon McCormick, “Terrorist Decision Making,” Annual Review of Political Science, Vol. 6 (June 2003), pp. 473–507.
  4. Bruce Hoffman and Gordon H. McCormick, “Terrorism, Signaling, and Suicide Attack,” Studies in Conflict and Terrorism 27.4 (2004), 243–81.
  5. Barbara Walter and Andrew Kydd, “Strategies of Terrorism,” International Security 31.1.
  6. Peter R. Neumann and M. L. R. Smith, The Strategy of Terrorism: How it Works, and Why it Fails (Oxon and New York: Routledge, 2008), pp. 31–75.
  7. Eitan Azani, “The Hybrid Terrorist Organization: Hezbollah as a Case Study,” Studies in Conflict and Terrorism 36.11 (November 2013), pp. 899–916.
  8. Max Abrahms, “Why Terrorism Does Not Work,” International Security 31.2 (Fall 2006), pp. 42–78.
  9. Peter Krause, “The Political Effectiveness of Non-State Violence: A Two-Level Framework to Transform a Deceptive Debate,” Security Studies 22.2 (2013), pp. 259–294.

Part II: Dynamics in Terrorist Groups

Lesson 3 (Nov 13): How Terrorist Groups Emerge

Required Readings:

  1. Ariel Merari, “Terrorism as a Strategy of Insurgency,” Terrorism and Political Violence 5.4 (1993), pp. 213–51.
  2. Michael G. Findley and Joseph K. Young, “Terrorism and Civil War: A Spatial and Temporal Approach to a Conceptual Problem,” Perspectives on Politics 10.2 (June 2012).

Recommended Readings:

  1. Donatella Della Porta, “Left-Wing Terrorism in Italy,” in Martha Crenshaw, ed., Terrorism in Context (University Park, PA: Pennsylvania State University Press, 1995), pp. 105–159.
  2. Leonard Weinberg, Ami Pedahzur, and Arie Perliger, Political Parties and Terrorist Groups, 2nd ed. (Oxon and New York: Routledge, 2009), pp. 17–74.
  3. David D. Laitin and Jacob N. Shapiro, “The Sources of Terrorism: An Ecological and Organizational Perspective,” in Philip Keefer and Normal Loayza, eds, Terrorism, Economic Development, and Political Openness (New York: Cambridge University Press, 2008).
  4. Konrad Kellen, “Ideology and Rebellion: Terrorism in West Germany,” in Reich, ed., Origins of Terrorism, pp. 43–58.
  5. Denis Aksoy David B. Carter, and Joseph Wright, “Terrorism in Dictatorships,” Journal of Politics 74.3 (July 2012).
  6. Denis Aksoy and David B. Carter, “Electoral Institutions and the Emergence of Terrorist Groups,” British Journal of Political Science (January 2013), pp. 1–24.
  7. Ehud Sprinzak, “From Messianic Pioneering to Vigilante Terrorism: The Case of the Gush Emunim Underground,” in David Rapoport, ed., Inside Terrorist Organizations (London: Frank Cass, 2001), pp. 194–216.

Lesson 4 (Nov 20): Structure, Bureaucracy, and Logistics

Required Readings:

  1. Brian A. Jackson, “Groups, Networks, or Movements: A Command-and-Control Driven Approach to Classifying Terrorist Organizations and its Application to Al Qaeda,” Studies in Conflict and Terrorism 29.3 (2006), 241–62.
  2. Mette Eilstrup-Sangiovanni and Calvert Jones, “Assessing the Dangers of Illicit Networks: Why al-Qaida may be Less Threatening than Many Think,” International Security 33.2 (2008), 7–44.

Recommended Readings:

  1. Jacob N. Shapiro, The Terrorist’s Dilemma: Managing Violent Covert Organizations (Princeton: Princeton University Press, 2013), 1–62.
  2. Ami Pedahzur and Arie Perliger, “The Changing Nature of Suicide Attacks: A Social Network Perspective,” Social Forces 84.4 (June 2006), pp. 1987–2008.
  3. Jacob N. Shapiro, “Bureaucratic Terrorists: Al Qa’ida in Iraq’s Management and Finances,” in Brian Fishman, ed., “Bombers, Bank Accounts and Bleedout: Al Qa’ida’s Road In and Out of Iraq” (West Point, NY: Combating Terrorism Center, 2008).
  4. Jacob N. Shapiro and David A. Siegel, “Moral Hazard, Discipline, and the Management of Terrorist Organizations,” World Politics 64.1 (January 2012), pp. 39–78.
  5. Scott Helfstein and Dominick Wright, “Covert or Convenient? Evolution of Terror Attack Networks,” Journal of Conflict Resolution 55.5 (2011): 785–813.
  6. Aaron Zelinsky and Martin Shubik, “Research Note: Terrorist Groups as Business Firms: A New Typological Framework.” Terrorism and Political Violence 21.2 (2009), pp. 327–336.

Lesson 5 (Nov 27): Psychological Aspects of Terrorist Group Membership

Required Readings:

  1. Clark McCauley and Sophia Moskalenko, “Mechanisms of Political Radicalization: Pathways Toward Terrorism,” Terrorism and Political Violence 20.3 (2008), 415–433.
  2. Albert Bandura, “Mechanisms of Moral Disengagement,” in Walter Reich, ed., Origins of Terrorism (Washington, DC: Woodrow Wilson Center Press, 1998), pp. 161–191.

Recommended Readings:

  1. Jeff Victoroff, “The Mind of the Terrorist: A Review and Critique of Psychological Approaches,” Journal of Conflict Resolution 49.1 (2005), pp. 3–42.
  2. Rex Hudson, Who Becomes a Terrorist and Why? The 1999 Government Report on Profiling Terrorists (Lyons, 2002), pp. 33–66.
  3. Martha Crenshaw, “The Psychology of Terrorism,” in Margaret G. Hermann, Political Psychology (San Francisco: Jossey-Bass, 1986), 395–403.
  4. Clark R. McCauley and Mary E. Segal, “Social Psychology of Terrorist Groups,” in Jeff Victoroff and Arie W. Kruglanski, eds., Psychology of Terrorism: Classic and Contemporary Insights (New York and Hove: Psychology Press, 2009), pp. 331–46.
  5. Jerrold Post, Ehud Sprinzak, and Laurita Denny, “The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern terrorists,” Terrorism and Political Violence 15.1 (2003), pp. 171–184.
  6. Ehud Sprinzak, “The Psychopolitical Formation of Extreme Left Terrorism in a Democracy: The Case of the Weathermen,” in Reich, ed., Origins of Terrorism, pp. 65–85.

Lesson 6 (Dec 4): Leadership

Required Readings:

  1. Gordon McCormick, “Terrorist Decision Making,” Annual Review of Political Science, Vol. 6 (June 2003), pp. 473–507.
  2. Jacob N. Shapiro, “Terrorist Decisionmaking: Insights from Economics and Political Science,” Perspectives on Terrorism 6.4–5 (2012). Available at http://www.terrorismanalysts.com/pt/index.php/pot/article/view/214/429.

Recommended Readings:

  1. Austin Long, “The Islamic State’s War Machine,” Lawfare Blog, 28 September 2014. Available at http://www.lawfareblog.com/2014/09/the-foreign-policy-essay-the-islamic-states-war-machine/.
  2. Susanne Martin and Arie Perliger, “Turning to and from Terror: Deciphering the Conditions under which Political Groups Choose Violent and Nonviolent Tactics,” Perspectives on Terrorism 6.4–5 (2012). Available at http://www.terrorismanalysts.com/pt/index.php/pot/article/view/215/431.
  3. Max Abrahms and Karolina Lula, “Why Terrorists Overestimate the Odds of Victory,” Perspectives on Terrorism 6.4–5 (2012). Available at http://www.terrorismanalysts.com/pt/index.php/pot/article/view/216/434.
  4. J. Tyson Chatagnier, Alex Mintz, and Yair Samban, “The Decision Calculus of Terrorist Leaders,” Perspectives on Terrorism 6.4–5 (2012). Available at http://www.terrorismanalysts.com/pt/index.php/pot/article/view/220/442.
  5. Gregory D. Miller, “Terrorist Decision Making and the Deterrence Problem,” Studies in Conflict and Terrorism 36.2 (February 2013).

Lesson 7 (Dec 11): Recruitment and Training

Required Readings:

  1. Donatella della Porta, “Recruitment Processes in Clandestine Political Organizations: Italian Left-Wing Terrorism,” in Victoroff and Kruglanski, eds., Psychology of Terrorism, pp. 307–316.
  2. Thomas Hegghammer, “The Recruiter’s Dilemma: Signaling and Rebel Recruitment Tactics,” Journal of Peace Research 50.1 (2013), pp. 3–16.

Recommended Readings:

  1. Leah Farrall, “Forward Focus: Assessing Al-Qaeda’s in-theater Capabilities,” HIS Defense Security and Risk Consulting, January 2012. Available at http://allthingsct.files.wordpress.com/2012/03/janes-article-2012.pdf.
  2. Madeleine Gruen, “Innovation, Recruitment, and Indoctrination Tactics by Extremists: Video Games, Hip Hop, and the World Wide Web,” in James J. F. Forest, ed., The Making of a Terrorist: Recruitment, Training, and Root Causes, Vol. 1: Recruitment (Westport, CT and London: Praeger Security International, 2006), pp. 11–22.
  3. Brian A. Jackson, “Training for Urban Resistance: The Case of the Provisional Irish Republican Army,” in Forest, ed., The Making of a Terrorist, Vol. 2: Training, pp. 119–35.
  4. James Brandon, “The Danger of Prison Radicalization in the West,” CTC Sentinel 2.12 (December 2009). Available at http://www.ctc.usma.edu/posts/the-danger-of-prison-radicalization-in-the-west.
  5. Fernando Reinares, “Jihadist Radicalization and the 2004 Madrid Bombing Network,” CTC Sentinel 2.11 (November 2009). Available at http://www.ctc.usma.edu/posts/jihadist-radicalization-and-the-2004-madrid-bombing-network.
  6. Aaron Y. Zelin, “The State of Global Jihad Online: A Qualitative, Quantitative, and Cross-Lingual Analysis,” New America Foundation, January 2013, pp. 1–24. Available at http://www.newamerica.net/sites/newamerica.net/files/policydocs/Zelin_Global%20Jihad%20Online_NAF.pdf.
  7. Sajjan Gohel, “The Internet and its Role in Terrorist Recruitment and Operational Planning,” CTC Sentinel 2.12 (December 2009). Available at http://www.ctc.usma.edu/posts/the-internet-and-its-role-in-terrorist-recruitment-and-operational-planning.
  8. Mohammed Ali Musawi, “Cheering for Osama: How Jihadis Use Internet Discussion Forums,” Quilliam, August 2010. Available at http://www.quilliamfoundation.org/images/stories/pdfs/cheering-for-osama.pdf.

Lesson 8 (Dec 18): Tactics, Technology, and Innovation

Required Readings:

  • Assaf Moghadam, “How Al Qaeda Innovates,” Security Studies 22.3 (2013).
  • Bruce Hoffman, Inside Terrorism, revised and expanded edition (New York: Columbia University Press, 2006), pp. 229–256.

Recommended Readings:

  1. Paul Gill, John Horgan, Samuel T. Hunter, and Lily D. Cushenberry, “Malevolent Creativity in Terrorist Organizations,” Journal of Creative Behavior 47.2 (2013), pp. 125–51.
  2. Brian Jackson and David Frelinger, “Rifling Through the Terrorists’ Arsenal: Exploring Groups’ Weapon Choices and Technology Strategies,” Studies in Conflict and Terrorism 31.7 (2008), pp. 583–604.
  3. Adam Dolnik, Understanding Terrorist Innovation (Oxon and New York: Routledge, 2006), pp. 1–57.
  4. Maria Rasmussen and Mohammed M. Hafez, eds., “Terrorist Innovation in Weapons of Mass Effect,” pp. 2–26. Available online at http://www.nps.edu/Academics/Centers/CCC/Research/2010%20019%20Terrorist%20Innovations%20in%20WME.pdf.
  5. Michael C. Horowitz, “Nonstate Actors and the Diffusion of Innovations: The Case of Suicide Terrorism,” International Organization 64.1 (Winter 2010), pp. 33–64.

Lesson 9 (Dec 25): Ideology and Martyrdom

Required Readings:

  1. Assaf Moghadam, “Motives for Martyrdom: Al Qaeda, Salafi Jihad, and the Spread of Suicide Attacks,” International Security 33.3 (Winter 2008/2009), pp. 46–78.
  2. Benjamin Acosta and Steven J. Childs, “Illuminating the Global Suicide-Attack Network,” Studies in Conflict and Terrorism 36.1 (January 2013), pp. 49–76.

Recommended Readings:

  1. Assaf Moghadam, “The Salafi-Jihad as a Religious Ideology,” CTC Sentinel 1.3 (February 2008). Available at http://www.ctc.usma.edu/posts/the-salafi-jihad-as-a-religious-ideology.
  2. Mohammed M. Hafez, “Martyrdom Mythology in Iraq: How Jihadists Frame Suicide Terrorism in Videos and Biographies,” Terrorism and Political Violence 19.1 (2007), pp. 95–115.
  3. Victor Asal and R. Karl Rethemeyer, “The Nature of the Beast: Terrorist Organizational Characteristics and Organizational Lethality,” Journal of Politics 70.2 (2008), 437–49.
  4. David A. Snow and Robert C. Byrd, “Ideology, Framing Processes, and Islamic Terrorist Movements,” Mobilization: An International Journal 12.2 (2007), pp. 119–136.
  5. CJM Drake, “The Role of Ideology in Terrorists’ Target Selection,” Terrorism and Political Violence 10.2 (1998), pp. 53–85.
  6. Ignacio Sanchez-Cuenca, “The Dynamics of Nationalist Terrorism: ETA and the IRA,” Terrorism and Political Violence 19.3 (2007), pp. 289–206.

Lesson 10 (Jan 1): Decline and Demise of Terrorist Groups

Required Readings:

  1. Audrey Kurth Cronin, “How al-Qaida Ends: The Decline and Demise of Terrorist Groups,” International Security 31.1 (2006), 7–48.
  2. Roundtable on “How Terrorism Ends,” H-Diplo | ISSF Roundtable, Volume II, No. 8 (2011). Available at http://www.h-net.org/~diplo/ISSF/PDF/ISSF-Roundtable-2-8.pdf.

Recommended Readings:

  1. Assaf Moghadam, “Failure and Disengagement in the Red Army Faction,” Studies in Conflict and Terrorism 35.2 (February 2012).
  2. Benjamin Acosta, “Live to Win Another Day: Why Many Militant Organizations Survive yet Few Succeed,” Studies in Conflict and Terrorism 37.2 (February 2014), pp. 135–61.
  3. Anja Dalgaard-Nielsen, “Promoting Exit from Violent Extremism: Themes and Approaches,” Studies in Conflict and Terrorism 36.2 (2013), pp. 99–115.
  4. Dipak Gupta, Understanding Terrorism and Political Violence, pp. 161–80.
  5. Martha Crenshaw, “How Terrorism Declines,” Terrorism and Political Violence 3.1 (1991), pp. 69–87.
  6. Arie Perliger and Leonard Weinberg, “How Terrorist Groups End,” CTC Sentinel 3.2 (February 2010). Available at http://www.ctc.usma.edu/posts/how-terrorist-groups-end.
  7. Anja Dalgaard-Nielsen, “Promoting Exit from Violent Extremism: Themes and Approaches,” Studies in Conflict and Terrorism 36.2 (February 2013): 99–115.
  8. Rogelio Alonso, “Why do Terrorists Stop? Analyzing why ETA (Euskadi Ta Askatasuna) Members Abandon or Continue with Terrorism,” Studies in Conflict and Terrorism 34.9 (September 2011), pp. 696–716.

Part III: Relationships Between Terrorist Groups

Lesson 11 (Jan 8): Competition Within and Between Terrorist Groups

Required Readings:

  1. Assaf Moghadam and Brian Fishman, “Jihadi ‘Endogenous’ Problems,” in Moghadam and Fishman, eds. Fault Lines in Global Jihad: Organizational, Strategic, and Ideological Fissures (Oxon and New York: Routledge, 2011), 1–22.
  2. Mia M. Bloom, “Palestinian Suicide Bombing: Public Support, Market Share, and Outbidding,” Political Science Quarterly 119.1 (Spring 2004).

Recommended Readings:

  1. Erica Chenoweth, “Democratic Competition and Terrorist Activity,” Journal of Politics 72.1 (2010), pp. 16–30.
  2. Vahid Brown, “Cracks in the Foundation: Leadership Schisms in Al-Qa’ida, 1989–2006” (West Point, NY: Combating Terrorism Center, 2006), 1–23. Available at http://www.ctc.usma.edu/wp-content/uploads/2010/06/cracks-in-the-foundation-leaderhip-schisms.pdf.
  3. Martha Crenshaw, “The Organizational Approach,” in Crenshaw, Explaining Terrorism, 82–85.
  4. Paul Cruickshank, “LIFG Revisions Posing Critical Challenge to Al-Qa`ida,” CTC Sentinel 2.12 (December 2009). Available at http://www.ctc.usma.edu/posts/lifg-revisions-posing-critical-challenge-to-al-qaida.
  5. Vahid Brown, “The Facade of Allegiance: Bin Ladin’s Dubious Pledge to Mullah Omar,” CTC Sentinel 3.1 (January 2010). Available at http://www.ctc.usma.edu/posts/the-facade-of-allegiance-bin-ladin%e2%80%99s-dubious-pledge-to-mullah-omar.
  6. Reuven Paz, “Jihadis and Hamas,” in Moghadam and Fishman, eds., “Self-Inflicted Wounds,” pp. 183–201. Available at http://www.ctc.usma.edu/wp-content/uploads/2011/05/Self-Inflicted-Wounds.pdf.
  7. Anand Gopal and Matthew DuPee, “Tensions Rise Between Hizb-i-Islami and the Taliban in Afghanistan,” CTC Sentinel 3.8 (August 2010). Available at http://www.ctc.usma.edu/posts/tensions-rise-between-hizb-i-islami-and-the-taliban-in-afghanistan.
  8. Marc Lynch, “Jihadis and the ikhwan,” in Moghadam and Fishman, eds., “Self-Inflicted Wounds,” pp. 155–82. Available at http://www.ctc.usma.edu/wp-content/uploads/2011/05/Self-Inflicted-Wounds.pdf.

Lesson 12 (Jan 15): Cooperation Between Terrorist Groups

Required Readings:

  1. Brian A. Jackson, John C. Baker, Kim Cragin, John Parachini, Horacio R. Trujillo, and Peter Chalk, Aptitude for Destruction, Volume 1: Organizational Learning in Terrorist Groups and its Implications for Combating Terrorism (Santa Monica, CA: RAND, 2005), 9–26.
  2. Tricia Bacon, “Alliance Hubs: Focal Points in the International Terrorist Landscape,” Perspectives on Terrorism 8.4 (2014). Available at http://www.terrorismanalysts.com/pt/index.php/pot/article/view/357.

Recommended Readings:

  1. Michael C. Horowitz and Philip B. K. Potter, “Allying to Kill: Terrorist Intergroup Cooperation and the Consequences for Lethality,” Journal of Conflict Resolution (January 2013).
  2. Brian A. Jackson, “Provisional Irish Republican Army,” in Brian A. Jackson, John C. Baker, Kim Cragin, John Parachini, Horacio R. Trujillo, and Peter Chalk, Aptitude for Destruction, Volume 2: Case Studies of Organizational Learning in Five Terrorist Groups (Santa Monica, CA: RAND, 2005), 93–140.
  3. Ely Karmon, “Coalitions between Terrorist Organizations,” Chapters 1–2.
  4. Vahid Brown, “Al-Qa’ida Central and Local Affiliates,” in Assaf Moghadam and Brian Fishman, “Self-Inflicted Wounds,” 69–99. Available at http://www.ctc.usma.edu/posts/self-inflicted-wounds.
  5. Emmanuel Karagiannis and Clark McCauley, “The Emerging Red-Green Alliance: Where Political Islam Meets the Radical Left,” Terrorism and Political Violence 25.2 (2013), pp. 167–82.
  6. Don Rassler and Vahid Brown, “The Haqqani Nexus and the Evolution of Al Qa’ida” (West Point, NY: Combating Terrorism Center, 2011). Available at http://www.ctc.usma.edu/posts/the-haqqani-nexus-and-the-evolution-of-al-qaida.

Lesson 13 (Jan 22): The Nexus of Global Jihad

Required Readings:

  1. Bruce Hoffman, “Al Qaeda’s Uncertain Future,” Studies in Conflict and Terrorism 36.8 (August 2013), pp. 635–53.
  2. J. M. Berger, “War on Error,” Foreign Policy.

Recommended Readings:

  1. Will McCants, “Al Qaeda’s Challenge: The Jihadists’ War with Islamist Democrats,” Foreign Affairs, September/October 2011.
  2. Leah Farrall, “How al Qaeda Works: What the Organization’s Subsidiaries Say About its Strength,” Foreign Affairs 90.2 (March/April 2011), pp. 128–38.
  3. Nelly Lahoud, et al., “Letters from Abbottabad: Bin Ladin Sidelined?” (West Point, NY: Combating Terrorism Center, May 2012). Available at http://www.ctc.usma.edu/wp-content/uploads/2012/05/CTC_LtrsFromAbottabad_WEB_v2.pdf.
  4. Daveed Gartenstein-Ross, “Don’t Get Cocky, America,” Foreign Policy, 2 May 2011. Available at http://www.daveedgr.com/news/dont-get-cocky-america/.
  5. Bruce Riedel, “AQAP’s ‘Great Expectations’ for the Future,” CTC Sentinel 4.8 (August 2011). Available online at http://www.ctc.usma.edu/posts/aqap%e2%80%99s-%e2%80%98great-expectations%e2%80%99-for-the-future.
  6. Alexander Gallo, “Understanding Al-Qa’ida’s Business Model,” CTC Sentinel 4.1 (January 2011), pp. 15–18. Available at http://www.ctc.usma.edu/posts/understanding-al-qaida%e2%80%99s-business-model.
  7. Barak Mendelsohn, “Al-Qaeda’s Franchising Strategy,” Survival (June/July 2011), pp. 29–50.
  8. Leah Farrall, “Will Al-Qa`ida and Al-Shabab Formally Merge?” CTC Sentinel 4.7 (July 2011).
  9. Bill Braniff and Assaf Moghadam, “Towards Global Jihadism: Al-Qaeda’s Strategic, Ideological and Structural Adaptations since 9/11,” Perspectives in Politics 5.2 (2011). Available at http://www.terrorismanalysts.com/pt/index.php/pot/article/view/braniff-towards-global-jihadism/html.
  10. Bruce Hoffman, “American Jihad,” National Interest (May/June 2010).
  11. Raffaello Pantucci, “Manchester, New York and Oslo: Three Centrally Directed Al-Qa`ida Plots,” CTC Sentinel 3.8 (August 2010). Available at http://www.ctc.usma.edu/posts/manchester-new-york-and-oslo-three-centrally-directed-al-qaida-plots.
  12. Assaf Moghadam, The Globalization of Martyrdom, 94–151.
  13. Peter Bergen, Bruce Hoffman, and Katherine Tiedemann, “Assessing the Jihadist Terrorist Threat to America and American Interests,” Studies in Conflict and Terrorism 34.2 (2012), pp. 65–101.

ad