You are on page 1of 17

International Studies Quarterly (2019) 63, 846–862

Drones, Surveillance, and Violence: Theory and Evidence from a US


Drone Program

A S FA N D YA R M I R
Stanford University
AND

DYLAN MOORE

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


University of Michigan
We investigate the impact of the US drone program in Pakistan on insurgent violence. Using details about US-Pakistan coun-
terterrorism cooperation and geocoded violence data, we show that the program was associated with monthly reductions
of around nine to thirteen insurgent attacks and fifty-one to eighty-six casualties in the area affected by the program. This
change was sizable, as in the year before the program, the affected area experienced around twenty-one attacks and one hun-
dred casualties per month. Additional quantitative and qualitative evidence suggests that this drop is attributable to the drone
program. However, the damage caused in strikes during the program cannot fully account for the reduction. Instead, anticipa-
tory effects induced by the program played a prominent role in subduing violence. These effects stemmed from the insurgents’
perception of the risk of being targeted in drone strikes; their efforts to avoid targeting severely compromised their movement
and communication abilities, in addition to eroding within-group trust. These findings contrast with prominent perspectives
on air-power, counterinsurgency, and US counterterrorism, suggesting select drone deployments can be an effective tool of
counterinsurgency and counterterrorism.

Introduction In this study we challenge prominent perspectives on


air-power, counterinsurgency, and US counterterrorism by
Drones are central to US counterinsurgency and coun-
showing that a drone program can be effective in lower-
terterrorism strategies across Africa, the Middle East, and
ing insurgent violence. We do so by studying the US drone
South Asia. Other powerful states are also heavily invest-
program in select regions of Pakistan’s insurgency-affected
ing in drones for countering their asymmetric foes (Zegart
Federally Administered Tribal Areas (FATA) beginning in
2015; Horowitz, Kreps, and Fuhrmann 2016; Fuhrmann and
2008. Drawing on details obtained from interviews with key
Horowitz 2017). Yet, major policy and scholarly wisdom on
officials, we posit that the program was enabled by con-
counterinsurgency and US counterterrorism questions the
tinuous aerial surveillance, wide-ranging communication
effectiveness of drone warfare against asymmetric threats
interception, an abundance of analysts for processing tech-
(Kilcullen and Exum 2009; Boyle 2013; Cronin 2013; Smith
nical/human intelligence gains, and unilateral targeting au-
and Walsh 2013; Jordan 2014; Abrahms and Potter 2015;
thority. US counterterrorism operators believe that such
Nielsen 2016; Hazelton 2017; Pape 2017).1 A key argument
capabilities are essential to successful operations in insur-
presented by these scholars is that drone strikes strengthen
gent safe havens and weak states.2 Given this salience, we
insurgents instead of weakening them. The scholarship on
fill an important gap in the literature by investigating a pro-
conventional air-power is similarly skeptical of the efficacy of
gram achieving such capabilities.
air strikes in countering insurgents, arguing that they fuel
Our analysis relies on the restriction of the drone pro-
insurgency in the local battlefield (Kocher, Pepinsky, and
gram to a specific geographic area in Pakistan. Under the
Kalyvas 2011; Dell and Querubin 2017).
terms of a covert agreement between the US and Pakistani
governments, US counterterrorism capabilities were limited
Asfandyar Mir is a postdoctoral fellow at Center for International Security to a “flight box” over the Waziristan region. Within that area,
and Cooperation, Stanford University. He has a PhD in political science from the
beginning in January 2008, the US government had inde-
University of Chicago.
Dylan Moore is a PhD student in the Department of Economics, University of pendent authority to undertake strikes, as well as large-scale
Michigan. He has an MA in economics from the University of Toronto. surveillance. Using newly geocoded data on violence in Pak-
Author’s Note: For helpful comments, the authors thank Christopher Clary, istan, we compare the evolution of insurgent violence before
Martha Crenshaw, C. Christine Fair, James Fearon, Andrea Gilli, Mauro Gilli, and after the launch of the US drone program inside North
Gemma Staton-Hagan, Sana Jaffrey, Ethan B. Kapstein, Sameer Lalwani, John Waziristan to that elsewhere in FATA. We find that the pro-
Mearsheimer, Robert Pape, MJ Reese, Jacob Shapiro, Paul Staniland, Monica
gram corresponds with a reduction in violence on the order
Toft, Kevin Weng, Jeremy Weinstein, Amy Zegart, the editors of ISQ, numerous
anonymous reviewers, and participants of seminars at the 2018 Annual Meeting
of nine to thirteen insurgent attacks per month and fifty-
of American Political Science Association, CISAC Social Science Seminar, Empiri- one to eighty-six casualties per month. This is suggestive of
cal Studies of Conflict Lab Meeting, Stanford Security Working Group, University a sizable effect as, in the year before implementation, the
of Chicago Program on International Security Policy, and the Stimson Center. As-
2
fandyar Mir thanks the University of Chicago Committee on Southern Asia Stud- Regarding the importance of continuous aerial surveillance and communi-
ies and the Social Science Division for financial support for data collection and cation interception, see Task Force (2013, 12) and Flynn et al. (2008). On the
fieldwork. All remaining errors are those of the authors alone. role of intelligence analysts, see: Lin-Greenberg (2018). On the value of devolved
1
Important exceptions include Byman (2013), Johnston and Sarbahi (2016), targeting authority, see Savage and Schmitt (2017). On synergy between such ca-
Horowitz et al. (2016), and Mir (2018). pabilities, see Shultz (2017).

Mir, Asfandyar, and Dylan Moore. (2019) Drones, Surveillance, and Violence: Theory and Evidence from a US Drone Program. International Studies Quarterly, doi: 10.1093/isq/sqz040
© The Author(s) (2019). Published by Oxford University Press on behalf of the International Studies Association.
All rights reserved. For permissions, please e-mail: journals.permissions@oup.com
A S FA N D YA R M I R AND DYLAN MOORE 847

region experienced twenty-one attacks and a resultant one nicated between them (Arkin 2015). One such technology is
hundred casualties in an average month. We clarify the as- Gilgamesh—which “is attached to unmanned Predator and
sumptions under which our data are consistent with a neg- even larger Reaper drones, where it performs a very specific
ative causal impact of the program on insurgent violence task in ‘signals intelligence,’ seeking out the faintest and
and evaluate their plausibility in light of both qualitative and most fleeting of buried digits emanating from the contem-
quantitative evidence. porary netherworld” (Arkin 2015). This type of technologi-
Our analysis highlights and rectifies a key limitation of cal surveillance is often combined with human intelligence
previous work on air-power and drones focusing on the ef- derived from interrogations of insurgents, networks of paid
fects of individual strikes (Johnston and Sarbahi 2016; Dell spies, and informants available to local partners (McChrystal
and Querubin 2017). We show that the aggregate impact of 2013, 199).
a program can be substantially different from the sum of The US government’s select drone deployments are able
the marginal impact of individual strikes. Our analysis sug- to exploit leads from surveillance sources to generate ac-

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


gests that nearly 75 percent of the violence reduction is as- tionable information and quickly act upon that information.
sociated with the drone program period without any strikes, They achieve this by drawing on plentiful analysis and col-
and about 25 percent is associated with aggregated effects lation paraphernalia to follow up on leads (Lin-Greenberg
of individual strikes. As the program’s strikeless period was 2018). Select deployments are also empowered to under-
constituted by sustained surveillance combined with rapid take targeting by extensive legal and political authority and
striking capability, this is suggestive of an important role of rapidly deployable striking platforms. If engaged in surveil-
persistent surveillance in thwarting an insurgency. lance, platforms like the MQ-1 Predator and MQ-9 Reaper
Our findings are best explained by insurgent degradation can be readily repurposed for precise targeting (Task Force
due to the drone program. Existing literature focuses on the 2013, 12–16).
killing of leaders and rank-and-file to explain consequences We claim that the combined effect of these capabilities
of targeting—which we call kinetic effects. Although such can reduce insurgent violence through two mechanisms:
kinetic effects are a key source of insurgent degradation, kinetic effects and anticipatory effects.4 Kinetic effects con-
our findings are best understood as the result of kinetic and sist of damage to insurgent organizations directly caused by
anticipatory effects. Targeting programs that leverage large- drone strikes, such as leadership decapitation, rank-and-file
scale surveillance and rapid exploitation of intelligence— attrition, lost capabilities, and casualties of civilian support-
as the program in Pakistan did—can substantially increase ers. Such effects have been extensively examined in studies
insurgents’ perception of the risk associated with activities of air-power, counterinsurgency, and leadership decapita-
they believe might precipitate strikes. The resulting changes tion (Pape 1996; Jordan 2009; Johnston 2012; Price 2012;
in insurgent behavior to avoid targeting constitute anticipa- Long 2014; Johnston and Sarbahi 2016). A drone program
tory effects. They include three major changes in insurgent that swiftly exploits intelligence generated by surveillance
life: restricted movement, constrained communication, and is likely to generate extensive kinetic effects, which can
compromised intragroup trust. These changes prevented reduce insurgent violence.
formidable armed groups like Al-Qaeda and the Pakistan In addition to kinetic effects, anticipatory effects un-
Taliban from meaningfully adapting to the drone program. dermine insurgency violence by inducing changes to their
Qualitative evidence, including some testimonies of mem- perception of the risk of being targeted rather than by
bers of Al-Qaeda and the Pakistan Taliban, support this view. physical damage in strikes. This mechanism has received
less attention in debates on air-power, counterinsurgency,
and drones. Scholars of population-centric counterinsur-
Theoretical Perspectives
gency focus more on variation in civilian support and
We conceptualize a drone program as a campaign that less on sources of insurgent organizational fragmentation
seeks to identify and swiftly target insurgents using sustained (Berman, Shapiro, and Felter 2011; Berman and Matanock
aerial surveillance, advanced communication interception, 2015; Shaver and Shapiro, forthcoming). Within exist-
intelligence analysts, and devolved targeting authority. Such ing work on drones, Johnston and Sarbahi (2016) and
a program can plausibly shape an important feature of in- Byman (2013) discuss ideas pertaining to anticipatory ef-
surgent politics: violence. Below, we synthesize and extend fects. Johnston and Sarbahi (2016, 206), for example, argue
existing theoretical work to predict the effect of a program that “drone strikes in an area represent a meaningful indica-
on insurgent violence. tion of an increased security risk to militants.” However, they
do not theorize how such a mechanism might undermine an
insurgency.
Drone Program as an Antagonist to Violence
Under a drone deployment with the surveillance and
We locate the drone program’s ability to undermine an in- targeting capabilities described above, we believe insurgents
surgency in its particular tactical, technological, and organi- are likely to anticipate being targeted and adjust their be-
zational capabilities.3 Consider the US government’s ideal havior accordingly. Although any campaign by state forces
drone deployment. Such deployments utilize intelligence, might produce such effects, a drone program’s sustained
surveillance, and reconnaissance (ISR) drones—often com- surveillance and swiftly executed strikes may produce espe-
bined with precise weapons delivery platforms—to monitor cially high levels of perceived risk of targeting. Insurgents
the civilian population and generate leads on the insurgency may feel compelled to significantly adjust their organiza-
(Flynn, Juergens, and Cantrell 2008; Task Force 2013). In tional practices to mitigate the threat posed by a drone
addition, communication interception is an important com- program, inducing changes in the way they move, commu-
plement to such platforms. The US government uses a nicate, and interact within their group in a bid to avoid tar-
variety of technical tools to identify the location of commu- geting. If insurgents feel that their movements may produce
nication devices and determine the content being commu- detectable patterns that precipitate strikes, they may re-
duce activities such as patrolling, picketing, or organizing
3
Not all drone deployments are accompanied by such capabilities. See Task
4
Force (2013, 12–16). For a theoretical discussion of the sources of such effects, see Mir (2018).
848 Drones, Surveillance, and Violence

sabotage in the open in a bid to avoid detection. Communi- in irregular warfare, affording the side they collaborate with
cation involving radios or mobile and satellite phones may an informational advantage and in turn an advantage in un-
prove difficult to maintain once insurgents come to realize dertaking violence (Berman et al. 2011). Some scholars ar-
that interception of communication devices can provide gue that attaining civilian cooperation is a function of lev-
cues about their locations. Intragroup trust may break els of civilian security and collateral damage (Berman et al.
down altogether; leaders and rank-and-file may exercise 2011; Condra and Shapiro 2012). If the drone program
increased caution in all interactions—even within their own harms the civilian population—as many analytical accounts
ranks—due to concerns of infiltration. of the US drone deployments suggest—we might expect it to
Our first hypotheses are motivated by both the kinetic and increase civilian support in favor of the insurgency. In turn,
anticipatory mechanisms: this may diminish the effectiveness of the program. This pro-
vides another motivation for hypotheses 2a and 2b.5
Hypothesis 1a: All else being equal, violence decreases during the Civilians might also join combat in response to victimiza-

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


operation of the drone program. tion by political actors (Goodwin 2001; Wood 2003). Wood
(2003, 235) provides an influential elaboration of this logic,
Hypothesis 1b: All else being equal, individual drone strikes will arguing that victimized civilians may join the insurgency as
be followed by a reduction in violence. a way to express their agency. An important body of schol-
arly work, press accounts, and human rights reports suggest
Hypothesis 1b follows from our discussion of the kinetic
that drones increase sympathy for insurgents by triggering
effects of the drone program. We expect most individual
sentiments of revenge in the civilian population (Clinic and
drone strikes to inflict some form of kinetic damage on in-
NYU School of Law 2012; Lamb, Woods, and Yusufzai 2012;
surgent organizations, thereby having the potential to re-
Boyle 2013; Cronin 2013; International 2013).6 This mech-
duce violence. As this hypothesis has been examined in the
anism provides further support for hypotheses 2a and 2b, as
literature, we primarily focus on hypothesis 1a, which can be
well as an additional hypothesis:
motivated by both mechanisms (Abrahms and Potter 2015;
Johnston and Sarbahi 2016). Regarding kinetic effects, note Hypothesis 3: All else being equal, violence increases during the
that if individual strikes reduce violence in the short-run, operation of the drone program.
a program involving the repeated execution of strikes will
reduce violence for at least as long as it is active. Further-
more, some individual strikes may produce kinetic damage US Drone Program in Pakistan: Background
that persists well into the future. In addition, the anticipa- We examine the impact of drones by studying the conflict in
tory effects mechanism may separately undermine violence Pakistan’s tribal region—the Federally Administered Tribal
once insurgents become aware of heightened surveillance Areas (FATA)—involving Al-Qaeda and the Pakistan Taliban
and its efficacy in targeting. It may also amplify damage due from 2003 to 2011. After 9/11, a coalition of Al-Qaeda and
to the kinetic effects and limit insurgents’ ability to recover local armed groups took root in the region and sought to
from such damage. overturn the Pakistani state through irregular warfare. This
conflict offers a unique opportunity to analyze the effects of
Drone Program as a Catalyst for Violence a drone program, launched by the US government in one
district of the FATA: North Waziristan Agency.7 In this sec-
There are potential countervailing forces, which may off- tion, we summarize important details of the program using
set the kinetic and anticipatory effects of a drone program. evidence gathered from multisourced interviews, including
For example, groups may find ways to adapt to the exis- with critical officials in the US and Pakistani governments.
tence of the program. This suggests the following alternative As the campaign in Pakistan unfolded under United States
hypotheses: Code Title 50, which substantially restricts the release of offi-
cial records, interview data was the most viable way to obtain
Hypothesis 2a: All else being equal, violence does not change dur- this information.8
ing the operation of the drone program. In January 2008, the US government launched a target-
ing program enabled by pervasive surveillance of the North
Hypothesis 2b: All else being equal, violence decreases during the Waziristan Agency. According to a senior US official from
early stages of the drone program but reverts (partially or completely) the period, the campaign involved sustained aerial surveil-
toward preprogram levels in the long-run. lance along with “full-motion video” analysis, communica-
Prospects of successful adaptation may depend on a tar- tion interception sensors, and a sizable bureaucracy of an-
geted group’s intrinsic type. An important literature on civil alysts dedicated to deriving actionable information from
war posits that outcomes of targeting insurgent groups are 5
See Investigative Journalism (2017) on civilian casualties. The US govern-
conditioned by the group’s characteristics. Scholars argue ment concedes a maximum of 117 civilian casualties. deaths from 2009 to 2016
that some armed groups possess attributes like social bases, in US counterterrorism warfare in Yemen, Somalia, and Pakistan. See Director of
quality recruits, institutionalization, networks, and prior ex- National Intelligence (2016).
6
periences of selective violence that make them both resilient Tahir (2015) makes a powerful argument that the practice and criteria of
drone strikes are akin to colonial collective punishment practices. Shah (2018)
and dynamic (Weinstein 2006; Jordan 2014; Long 2014; challenges the view that drone strikes increase radicalization at the local level.
Staniland 2014; Finkel 2015; Toft and Zhukov 2015). We Fair (2014) and Fair, Kaltenthaler, and Miller (2015) suggest that to the extent
might expect such groups to quickly recover when harmed that anti-Americanism exists in Pakistan, it is not due to drone strikes alone.
and, over time, learn how to operate effectively despite the 7
Drone operations also occurred in South Waziristan Agency, but we exclude
program. it from our analysis for reasons discussed below. For the politics of the conflict in
Another countervailing force stems from civilian behav- FATA, see Staniland, Mir, and Lalwani (2018)
8
This draws on sixty-six interviews conducted under University of Chicago
ior. The literature on counterinsurgency and civil war sug- IRB protocol no: IRB 16-0234. Identities of respondents have been withheld for
gests that civilian behavior is of strategic importance in reasons of safety. FOIA requests submitted to the Director of National Intelli-
wartime (Kalyvas 2006; Berman and Matanock 2015). This gence (DF-2016-00300), CIA (F-2017-01836), and US CENTCOM/Air Force Cen-
literature views civilians as central conduits of information tral Command (USCENTCOM 17-0486) have yet to yield information.
A S FA N D YA R M I R AND DYLAN MOORE 849

available leads.9 A former Pakistani official from the Coun- US access to the region’s population records and communi-
terterrorism (CT) division of the ISI who coordinated the cation infrastructure was enhanced, which included stepped
drone program with the US government noted that these up help with interception of radio and land-line communi-
capabilities were realized following a January meeting be- cation.16
tween General Pervez Musharraf, the president of Pakistan, The US government appears to have respected the
and US intelligence chiefs Michael Hayden, the director constraints of the flight box. Key Pakistani officials from the
of the CIA, and Michael McConnell, the Director of Na- period stated that, barring occasional transgressions and
tional Intelligence.10 At this meeting, Musharraf approved pre-authorized activity, drone surveillance and strikes were
an expanded counterterrorism campaign in the tribal ar- limited to the agreed upon areas. The sanctity and impor-
eas, apparently motivated by a desire to retain US support tance of the box to US officials is made plausible by their
while confronting pressure from domestic political actors attempts to negotiate its expansion—doing so as early as
calling for his resignation in the aftermath of the Decem- February 2008 and once again in 2010.17 They also sought

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


ber 27, 2007, killing of Pakistani politician Benazir Bhutto. the addition of a box covering areas of Baluchistan province.
A Pakistani intelligence official from the period noted that
“Musharraf was under tremendous pressure at the time” and
the “American delegation’s visit right after Benazir Bhutto’s Empirical Strategy
death gave them the pretext to press General Musharraf on Our empirical strategy is a simple one: we compare trends
drone strikes being the way forward.”11 in violence in North Waziristan Agency to those in areas of
Following the meeting, Pakistani military negotiators FATA outside the flight box before and after the introduc-
led by General Ashfaq Kayani—and including represen- tion of the drone program. Figure 3 provides a basic presen-
tatives of Pakistan’s nuclear bureaucracy, the Strategic tation of this information, depicting measures of total in-
Plans Division—finalized the parameters of an improved surgent attacks and resultant casualties for each half-year of
intelligence-sharing arrangement. The foundation for this the study period within North Waziristan Agency and within
arrangement was provided by a 2004 agreement between areas of FATA outside the Waziristan flight box (Kurram,
the Pakistani and US governments permitting limited US Khyber, Bajaur, Mohmand, and Orakzai Agencies).
drone deployment within FATA. Back then, operations were The figure shows an upward trend throughout FATA in
confined to two demarcated “flight boxes”—depicted in the period prior to the program’s initiation. After January
figure 1—and required advance authorization from Pak- 2008, this growth continued in the areas unaffected by the
istani authorities.12 program—if perhaps at a somewhat slower rate—but ap-
The new agreement in 2008 allowed continuous recon- pears to have stopped or even reversed in North Waziristan.
naissance and kinetic targeting within only the southern This pattern is the primary empirical finding of this paper. If
box, covering the Waziristan regions. Pakistani military one attributes this break in trend to the program—assuming
negotiators denied US requests to extend the box over that, in its absence, violence in North Waziristan would have
Waziristan and revoked the northern box—covering Bajaur followed a trend similar to that in the rest of FATA—it fol-
Agency—to minimize the risk of public backlash that a US lows that the program had a large negative impact on vio-
presence in Pakistan might bring.13 Both in 2004 and 2008, lence in that region.
Pakistani negotiators worried that the US government might We consider several approaches to quantifying the corre-
use unrestrained surveillance permission to spy on proxi- lation described above. We also discuss the assumptions un-
mate sites of Pakistan’s nuclear program, offices of ISI de- der which the estimated correlations are consistent with a
tachments suspected to be aiding the Haqqani Network, and causal effect, assessing their plausibility in light of available
“other facilities”.14 quantitative and qualitative evidence. Ultimately, we con-
Under the 2008 pact, the US government could unilat- clude that there is substantial support for the hypothesis that
erally undertake surveillance and drone strikes throughout the US drone program in Pakistan had a negative impact on
the Waziristan agencies. Figure 2 depicts the temporal distri- insurgent violence.
bution of (known) drone strikes occurring in North Waziris-
tan Agency between 2003 and 2011.15 Pakistan additionally
committed to intensifying human intelligence operations Study Area and Period
conducted in conjunction with the CIA’s forward bases in Our study examines the period from January 2003 to
the towns of Bannu, Mir Ali, and Miramshah. Furthermore, November 2011 in a sample of thirty-two tehsils—a granular
political jurisdiction—in FATA. The nine tehsils of North
9
This official, uniquely positioned to comment on US counterterrorism cam- Waziristan form our treatment region, while the twenty-
paigning, emphasized that the US campaign in Pakistan was exceptional in the three tehsils of Bajaur, Khyber, Mohmand, Orakzai, and
scale of available resources and associated capabilities in the period from 2008 Kurram agencies form our control region. We exclude
to 2014; on follow-up questions seeking clarification and comparison, the official South Waziristan Agency from our analysis because we
noted that to her/his knowledge, not even half of similar capabilities were real- remain uncertain about the nature of the program as
ized in Yemen, at least until 2014.
10
Interview Islamabad, Pakistan, 2016. Broad account confirmed in interviews
implemented there. Dozens of interviews with Pakistani
with US officials. intelligence and military officials, civilians, journalists, and
11
Interview retired ISI Official, 2016 members of Al-Qaeda and the Pakistan Taliban suggested
12
Flight boxes have been previously discussed by Mazzetti (2013, 108). that while drone surveillance was ubiquitous in North
13
In addition to Bajaur, the northern flight box included parts of Dir and Chi- Waziristan during the program, it was far more intermittent
tral, which fall outside FATA. Interviews with Pakistani military negotiators from
the time (2004) suggest that the United States wanted to monitor Chitral due to
16
suspicions about Osama-bin-Laden’s presence there. Thus, to allow a coherent See details of NSA’s signal interception operations center operated with ISI
corridor, Pakistani negotiators extended the box as far as Chitral. in Islamabad, called the Combined SIGINT Operations Center, in support of op-
14
A US government official from the period confirmed that Pakistani nego- erations in Waziristan: SIGINT Liaison Officer (2006). In 2008, Pakistani support
tiators raised some of these concerns. for such centers surged. On availability of bulk Pakistani cellular call records to
15
BIJ reports less than twenty strikes outside Waziristan agencies between 2008 the NSA and their use for locating targets, see Development (2012).
17
and 2011. Interview, US Government Official, 2016.
850 Drones, Surveillance, and Violence

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


Figure 1. Map of FATA. Insert shows map of Pakistan. The shaded areas were first demarcated as flight boxes in 2004. In
2008, the program was implemented in the southern box; the northern box was deactivated at this time. These boundaries
are estimates adapted from a map hand-marked by a Pakistani intelligence official privy to the demarcation. Two former US
officials confirmed these boundaries.

20 Data
Our dependent variables are derived from a dataset com-
Drone Strikes per Month

piled by the BFRS project, containing information on re-


15 ported incidents of political violence occurring within the
FATA between January 2002 and November 2011 (Mesquita
et al. 2014, 8).19 We geocode these incidents in order to con-
10 struct tehsil-month-level measures of insurgent attacks and
resultant casualties.20 We exclude all incidents unlikely to
be related to insurgent violence: drone strikes and attacks
5 perpetrated by Pakistani security forces, any foreign security
forces, student groups, religious parties, unions, civil society
groups, political parties, or Pakistani intelligence agencies.21
0 Figure 5 displays our measures of monthly attacks and casu-
alties in each district of FATA.
03

04

05

06

07

08

09

10

11

12
20

20

20

20

20

20

20

20

20

20

Employing tehsil-month-level observations in our regres-


sion analyses permits examining spatial variation in violence
Figure 2. Total monthly drone strikes recorded by the Bu-
at a finer level than previous empirical studies of violence
reau of Investigative Journalism in North Waziristan Agency.
in Pakistan. These were constrained to district-level analysis.
The dotted line marks beginning of the drone program in However, it is important to note that the drone program ap-
January 2008. pears to have been assigned at the level of district, not tehsil.
Thus, the primary advantage of our tehsil-level analysis is
that it permits the use of tehsil-specific control variables.22
in South Waziristan. With the onset of Operation Rah-e-
Nijat—a major Pakistani counterinsurgency campaign in
October 2009—respondents noted that the already inter- 19
The analysis reported is robust to a different dataset on political violence in
mittent surveillance grew even more infrequent (Yusufzai Pakistan at the district level from 2007 to 2014. See supplement.
20
2009).18 Figure 4 visualizes our sample geographically. Casualties are here defined as civilian and military deaths and injuries. In-
surgent casualties are excluded.
21
For details, see supplement.
18 22
In unreported results, we verified that our findings are robust to including Conceivably, it might yield improved statistical inference, but, as we discuss
this region. later, this is in doubt.
A S FA N D YA R M I R AND DYLAN MOORE 851

(A)

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


(B)

Figure 3. These graphs depict our measures of insurgent violence within and outside of North Waziristan in each half year of
our study period alongside linear trends fit before and after the program commenced. The dotted lines mark the beginning
of the drone program. A: Insurgent attacks outside the drone program region on the left. Insurgent attacks inside the drone
program on the right. B: Casualties in insurgent attacks outside the drone program region on the left. Casualties in insurgent
attacks inside the drone program on the right.

Table 1 displays instructive descriptive statistics on the pe- include tehsil-specific linear time trends (τ i ) and additional
riod before the drone program commenced.23 There were control variables (Xit ).
meaningful similarities but also important differences be- It seems likely the error terms in this specification will ex-
tween tehsils subjected to the drone program and those that hibit serial correlation, raising concerns of downwardly bi-
were not. This might be explained in part by the nonran- ased standard errors and consequent over-rejection of the
dom assignment of the drone program, but even with ran- true null hypotheses (Bertrand, Duflo, and Mullainathan
dom assignment at the district level, large differences would 2004). To address this, we present standard errors clustered
not be anomalous in such a small sample of districts. by tehsil. We also employ the wild bootstrap approach pro-
posed by Cameron, Gelbach, and Miller (2008), which may
be more reliable given our small number of clusters (32).24
Regression-Based Results Ultimately, both strategies are imperfect, for reasons dis-
In this section, we use standard panel methods to estimate cussed in the supplement.
the magnitude of the correlation between the drone pro- Tables 2 and 3 present regression results with the num-
gram and levels of violence. All of our regression specifica- ber of insurgent attacks and the number of resultant casu-
tions conform to the following structure: alties per tehsil per month as dependent variables. These
estimates of δ simply capture the correlation between our
Yit = δ j (t reatt .nwai ) + αi + θt + βX it + τi · t + εit (1) outcome variables and the drone program in space and
time after partialling out the influence of fixed effects and
where Yit is the outcome variable, treatt is a variable indicat- additional control variables. Connecting these correlations
ing whether time period t (a month) occurs in 2008 or later, to the program’s impact requires additional assumptions,
and nwai is a binary variable indicating whether tehsil i is which we discuss alongside the results below.
in North Waziristan Agency. Our base specification includes Column 1 in each table presents estimates from the base
this interaction term along with vectors of tehsil fixed ef- specification, which imply that the US drone program’s im-
fects (α i ) and month-year fixed effects (θ t ), which account plementation was accompanied by an average reduction
for differences in levels of violence that are tehsil-specific of approximately one attack and 5.7 casualties per tehsil
but time-invariant and vice versa. Other specifications also per month. Both estimates are statistically significant and

23 24
The supplement discusses data sources. We use one thousand bootstrap replications to implement this method.
852 Drones, Surveillance, and Violence

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


Figure 4. Map of FATA. Insert shows map of Pakistan.

substantively large; over the preprogram period, tehsils in Next, we consider the impact of adding additional con-
North Waziristan saw an average of 0.56 attacks and 2.34 ca- trol variables.27 Particularly relevant controls are those per-
sualties per month.25 taining to peace deals and military operations. Peaceit and
When applied for causal inference, this specification im- MOit are tehsil-month-level variables indicating whether—
plements a simple difference-in-differences design. Inter- within tehsil i during month t—any peace deal was active or
preting our estimates as pertaining to treatment effects sizable declared Pakistani military action was underway, re-
requires a so-called parallel-trends assumption. In our con- spectively. Both variables were sourced from publicly avail-
text, this means assuming that the post-2008 change in ex- able news reports.28
pected monthly attacks and casualties per tehsil outside We also include controls for two other factors potentially
North Waziristan Agency is identical to that which would relevant to the dynamics of violence in the region during
have obtained for a counterfactual North Waziristan Agency this period. The first is motivated by the role of the fa-
unexposed to the program. Notice, however, that figure 5 mous Haqqani Network, a North Waziristan–based Afghan
seems to suggest that variation in violence prior to 2008 armed group that began to openly oppose violence against
did not follow a parallel trend of this kind, increasing at a the Pakistani state on June 23, 2006 (Khan 2006). Field re-
much faster rate in North Waziristan Agency than other dis- search suggests that the group’s cadres were concentrated
tricts. Given this, there is reason to doubt that it would have near Jalal Haqqani’s base in the town of Dande-e-Darpakhel
done so after 2008 absent the program. In an upcoming sec- in Miramshah, a tehsil of North Waziristan, as well as other
tion, we present formal evidence of a departure from paral- areas of Miramshah and the neighboring tehsil of Ghulam
lel trends in the pretreatment period, cautioning against a Khan. We attempt to account for the group’s role using the
straightforward causal interpretation of our estimates. variable Haqqaniit , an indicator equal to one for all observa-
Column 2 displays an estimate from a specification tions in Miramshah and Ghulam Khan after June 2006 and
that adds tehsil-specific linear time trends. This is a com- zero at all other times and places. We similarly attempt to ac-
mon technique for addressing concerns about nonparal- count for increased NATO/ISAF supplies passing through
lel trends, which alters the assumptions needed for causal Pakistan after President Obama’s “Af-Pak” review in March
interpretation of estimates of δ, instead requiring parallel 2009, which potentially attracted insurgent violence along
trends in deviations from the time trends.26 This specifica- the supply routes passing from two tehsils in FATA’s Khyber
tion yields negative estimates of δ larger in magnitude than Agency, Landi Kotal and Jamrud.29 We code a tehsil-month
the base specification. variable ObamaReviewit as equal to one for observations in

27
We try to incorporate relevant macrolevel political variables. On the macro-
25
And 1.4 attacks and 6.9 casualties per month in 2007, the final year before micro divide, see Balcells and Justino (2014).
28
the program. See supplement for coding protocol.
26 29
See Mora and Reggio (2017) for a detailed discussion. Woodward (2011) provides a detailed discussion of the “Af-Pak” review.
A S FA N D YA R M I R AND DYLAN MOORE 853

Table 1. Balance table pre–drone program. This table displays preprogram sample means for a number of variables both inside and outside North
Waziristan Agency, as well as differences in these means between these two regions. For the first four variables, we present means of tehsil-
month-level variables from 2003 to 2007. The remaining variables are measured at the district-level at a single preprogram time period, and we
present district-level means weighted by the number of tehsils per district.

Mean (tehsils NWA) Mean (other tehsils) Difference

Incidents 0.56 0.21 −0.36


Casualties 2.34 0.70 −1.64
Peace deal 0.23 0.06 −0.18
Military operations 0.03 0.01 −0.02
Population per tehsil 40138.44 93296.17 53157.73
Male per tehsil 21381.22 48096.41 26715.19

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


Female per tehsil 18757.11 45199.76 26442.65
Education spending (in Rs) per tehsil 112.05 97.41 −14.65
Health spending (in Rs) per tehsil 63.89 44.58 −19.31
Agriculture spending (in Rs) per tehsil 24.87 21.17 −3.70
Wheat produce per tehsil 7.18 19.56 12.38
Annual registration per tehsil 19794.00 18818.28 −975.72
Total registered population per tehsil 74735.80 96695.64 21959.84
Prop registered population per tehsil 2.26 1.13 −1.12
Valid votes cast per 100 k 7917.04 9231.59 1314.55
Reject votes cast per 100 k 80.00 175.89 95.89
Registered voters cast per 100 k 26698.70 38843.70 12145.00

Table 2. Incident results (six region strategy) Table 3. Casualty results (six region strategy)

(1) (2) (3) (4) (1) (2) (3) (4)


Attacks Attacks Attacks Attacks Casualties Casualties Casualties Casualties

treat.nwa −1.039* −1.420* −1.405* −1.462* treat.nwa −5.698* −8.735* −8.860* −9.532*
(0.259) (0.583) (0.563) (0.595) (1.406) (2.161) (2.013) (2.174)

MO 0.900 MO 4.817*
(0.444) (2.075)

Peace −0.150 Peace −1.024


(0.189) (1.008)

Obamareview 0.383 0.142 Obamareview 4.655 4.915


(0.260) (0.265) (2.732) (3.079)

Haqqani 0.602 0.928 Haqqani −1.750 −0.581


(0.522) (0.700) (1.360) (1.421)
Observations 3638 3638 3638 3638 Observations 3638 3638 3638 3638
WB p-value 0.00200 0.0200 0.0300 0.0140 WB p-value 0.00200 0.00200 0.00200 0.00200
Year FE X X X X Year FE X X X X
Tehsil FE X X X X Tehsil FE X X X X
Time trends X X X Time trends X X X
Controls X X Controls X X
Hetero. ctrls. X Hetero. ctrls. X

Notes: Standard errors in parentheses. *p < 0.05. Notes: Standard errors in parentheses. *p < 0.05

Landi Kotal and Jamrud tehsils later than February 2009 and tion needed for a causal interpretation of the linear time
zero elsewhere. trend specification—discussed above—is satisfied after con-
The third and fourth columns of the tables report coef- ditioning on these variables. The ObamaReviewit variable, by
ficient estimates from specifications that include these con- contrast, is motivated by concern that the changes in vio-
trol variables in addition to linear time trends. They differ lence that accompanied the heightened NATO supply line
in that the former uses just the two indicator variables de- activity are not informative about the counterfactual path
scribed above to control for military operations and peace of violence in North Waziristan and should not be ignored
deals, while the latter includes interactions between these when estimating the drone program’s impact.
and tehsil indicators permitting tehsil-specific influences by However, we want to emphasize that peace deals and
these factors. The resulting estimates are quite similar to military activity are likely endogenous to the introduction
those from the time trend specification. of the program, which may have substituted for Pakistani
The inclusion of most of these controls can be motivated state activity of this kind. The causal interpretation of the
by the possibility that the weakened parallel-trends assump- corresponding estimates—if warranted—differs from that
854 Drones, Surveillance, and Violence

accompanying specifications without these controls. At best, gram’s commencement. In the next section, we discuss qual-
these estimates of δ measure the drone program’s impact, itative evidence supporting the perspective that these pre-
holding military operations and peace deals constant.30 program patterns of violence in North Waziristan were not
That is to say, the assumed counterfactual is one in which outliers and should have been expected to continue absent
Pakistani state activity in post-2008 North Waziristan would the drone deployment.
have been the same as that actually observed. This may not
be the most policy-relevant counterfactual. DISPLACEMENT
Another concern is that the drone program might have in-
Alternative Interpretations duced insurgent leadership and manpower to move to areas
outside the flight box, leading to displacement of violence
Here, we discuss two alternatives to a causal interpretation to other parts of FATA. This would undermine a strictly
of the regression-based results reported until now. causal interpretation of our findings.

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


If there were displacement effects, we would expect them
MEAN REVERSION to be strongest in Orakzai and Kurram, the districts closest
One concern is that our results may simply reflect mean re- to North Waziristan Agency. Figure 5 shows that violence in
version following anomalous spikes in violence in the North Orakzai was minimal before 2008, consistent with a story of
Waziristan Agency between 2005 and 2007. This concern violence displacement. In Kurram, observed increases in vi-
arises in many program evaluation exercises when there is olence in the period after 2008 are consistent with a pattern
reason to suspect that treatment was endogenously assigned. of growth that predates the program.
Evidence from field work suggests that this was not the case By contrast, Bajaur and Mohmand Agencies seem the
with the drone program. least likely to experience contamination from the drone
We introduced details of the flight box negotiation program since they are not contiguous to North Waziristan.
process earlier in the paper. While motivated by strategic Furthermore, there are significant geographical barriers be-
considerations, the final geography and time period of tween them; all major travel routes to Bajaur and Mohmand
imposition were shaped by considerations unrelated to Agency from North Waziristan Agency pass through Pe-
the insurgency, including General Musharraf’s regime shawar and Kohat, urban areas with strong Pakistani state
survival concerns, the Pakistani government’s concerns of presence. As such, the posttreatment increase in violence
US spying on the country’s nuclear program, and concerns that is observed in these districts should assuage this con-
of public backlash. In addition to the evidence already cern to some degree.
discussed, we attempted to ascertain whether negotiations We compliment this informal analysis with empirical ro-
were influenced by or a response to the spike in violence bustness checks. We rerun the regressions discussed in the
in the North Waziristan Agency in the second half of 2007. previous section on five restricted samples, each containing
Pakistani officials from the period explicitly denied this. A only one of our control districts: Bajaur, Khyber, Kurram,
Pakistani official coordinating the counterterror campaign Mohmand, and Orakzai.33 Figure 6 graphically presents the
with the US government noted: “If you recall, we were in resulting point estimates of δ and accompanying confidence
deep national crisis at that time. Benazir Bhutto was killed intervals.34 The estimates are broadly similar to those based
on the 27th [of December, 2007]. Elections were due soon. on our full sample, though not always as statistically sig-
North Waziristan was far from a priority for either General nificant. We interpret the similarity of coefficient estimates
Musharraf or [Chief of Army Staff] General Kayani.”31 In a as evidence that our findings are not driven by spillover
notable interview for the study, a general officer in-charge effects.
of Pakistani ground forces in the tribal areas from 2007 to In addition, we found no qualitative evidence supporting
2010 denied the program launch was linked to the surge in the displacement hypothesis. Interviewed members of the
violence, adding that he protested drone use in his area of Pakistan Taliban noted that select cadres from the North
operations.32 Waziristan Agency left for Karachi, parts of Afghanistan, and
In light of this evidence, we contend that the complex po- South Waziristan Agency in 2012/2013 but not to other
litical process, which shaped the location of the flight box tribal districts that are part of our study.35
and in turn the drone program, was largely exogenous to in- Note that the causal interpretations of these new esti-
surgent violence in the FATA. However, in our context, this mates rely on different parallel-trends assumptions than
is not enough to ensure that the parallel-trends assumption those in our original analysis. In the base specifications,
holds. Because the program appears to have been assigned the postprogram change in expected monthly violence per
at the district level, there remains substantial risk that the tehsil in the single included control district is assumed to be
post-2008 changes in violence in areas outside the flight box exactly the same as that for counterfactual North Waziris-
would differ from those within the box purely by chance. tan. The stability of the estimates thus demonstrates the ro-
The preprogram departure from parallel trends that we doc- bustness of our results to mild variations in the particular
ument in the next section provides strong evidence that this assumptions made about counterfactual violence in North
was the case. Waziristan.
Thus, mean reversion remains worthy of serious con-
sideration even under exogenous program assignment.
Addressing Nonparallel Trends
However, we note that the intermittent spikes in violence
exhibited in North Waziristan between 2005 and 2007 are In this section, we first formally document nonparallel
similar in character to patterns of violence observed else- trends in pre-2008 violence levels between our treatment
where in FATA after—and in some cases, before—the pro- and control regions. We then discuss possible reasons for

30 33
This is a variant of the so-called “bad control” problem in Angrist and Pis- The sample for each regression includes only tehsils from North Waziristan
chke (2008). and one district unaffected by the program.
31 34
Interview, Islamabad, Pakistan, 2016. Results from tables 2 and 3 are included for comparison.
32 35
Interview, Islamabad, Pakistan, 2016. Interviews, Pakistan, 2016–2017.
A S FA N D YA R M I R AND DYLAN MOORE 855

(A)

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


(B)

Figure 5. A: Number of insurgent attacks by month and district. The dotted lines mark the beginning of the drone program.
B: Number of casualties by month and district. The dotted lines mark the beginning of the drone program.

this and investigate what can be inferred from observed causal inference in the absence of a parallel-trends assump-
patterns of violence in FATA in spite of this problem, in tion.36
light of available qualitative evidence on the nature of the Let H(t) be a function that maps a given month t from
processes generating this violence. our study period into the half-year containing it. A half-
year is either the first or last six months of a given year;
for example, January–June 2002. Further, suppose we la-
bel each half-year sequentially with an integer such that the
Event Study
Here, we use an event study to explicitly track the differen-
tial trends in violence that underly the correlation between
the drone program and violence. This method offers one 36
Event-study strategies of this kind are increasingly employed in the applied
way to formally test for a departure from parallel trends in microeconomics literature. See Alsan and Wanamaker (2018) for a recent appli-
the preprogram period and a lens through which to discuss cation.
856 Drones, Surveillance, and Violence

(A) (B)

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


Figure 6. Incident results on the left, casualties result on the right. These figures display estimates of the coefficient δ from all
four versions of specification (1) for each choice of control region we consider along with confidence intervals (accounting
for tehsil-level clustering).

final half-year before the drone program was implemented of the null hypothesis that all preprogram event-study
(July–December 2007) is labeled zero.37 coefficients are zero give p-values of 0.005 with insurgent
Then our event-study specification can be written: attacks as the dependent variable and 0.01 with casualties
−1
as the dependent variable. This constitutes strong evidence
     of nonparallel trends in the preprogram period, warranting
Yit = δ j 1 H (t ) = j .nwai
skepticism regarding the causal interpretation of estimates
j =−9
from our base specification.39
8
     Post-2008 event-study coefficients (j > 0) are also all neg-
+ δ j 1 H (t ) = j .nwai + ai + θt + εit (2) ative, larger in magnitude than any of the preprogram es-
j =1 timates, and mostly statistically significant. For the attacks
dependent variable, they become increasingly negative over
where i denotes tehsil and t denotes month. time; for the casualties dependent variable they decline
This equation is similar to (1), but it includes interac- more rapidly and remain stable thereafter. This indicates
tions between an indicator for whether a tehsil is in North that the difference in levels of violence shrank after the in-
Waziristan Agency and dummy variables for each half-year troduction of the program and remained at that reduced
in our sample except July–December 2007 rather than a level for the duration of the program, perhaps even reduc-
single interaction term with a post-2008 indicator. Each ing further with time. Under the parallel-trends assump-
coefficient δ j on these interaction terms measures the tion, these estimates would be unbiased estimates of the
expected difference in monthly violence per tehsil between program’s average treatment effect in each half-year period
North Waziristan Agency and the control district during following it’s introduction. Substantively, this requires as-
half-year j, less the value of that same difference in the suming that violence would have continued to increase in
half-year prior to the start of drone program (j = 0).38 the North Waziristan Agency absent the program, albeit at a
Figure 7 displays estimates of these δ j coefficients for each j reduced rate relative to the growth in the late preprogram
= 0. Let us call these the event-study coefficients. period. Since we have already cast doubt on the parallel-
Our estimates of δ j for j < 0 can be used to test for trends assumption, it is worth considering what alternative
preprogram parallel trends. If the parallel-trends assump- assumptions might imply about the causal effect of the pro-
tion held in that period, these coefficients would be zero, gram.
since the difference in expected levels of violence between Suppose that violence in the North Waziristan Agency
tehsils inside and outside North Waziristan would have been would have remained at preprogram levels in the absence of
constant. For both outcome variables, our estimates of these the US drone program. Although this would imply that esti-
coefficients are large and negative, reflecting the fact the mates from our base specification overstate the program’s
differences in average violence earlier in the preprogram impact, the empirical patterns would still imply a nega-
period were smaller than in the latter half of 2007. The tive effect. To see this, refer back to figure 5a, and note
estimates reflect a noisy trend of increasing differences be- that our results are not only driven by increasing violence
tween the tehsils within the flight box and those elsewhere outside the flight box after 2008 but also by the absence
in FATA as the program start date approached. Although within North Waziristan of the large spikes in violence ob-
most are not independently statistically significant, F-tests served during 2006 and 2007 after the commencement of
the drone program. A negative causal effect of the program
37
By way of example, this implies that H(March 2008) = 2 and H(August
2006) = −2.
can only be ruled out if one thinks it likely that this ob-
38
Our use of half-year rather than month dummies in constructing the inter- served decline in violence would have occurred anyway—or
action terms—while ad hoc—was intended to increase statistical power to detect been more severe—absent the program. We contend that
instances where these coefficients are nonzero. Alternative constructions yield
39
qualitatively similar results, with estimates tending (unsurprisingly) to grow nois- As noted previously, the requisite parallel-trends assumption is different for
ier and confidence intervals wider as temporal granularity of the interaction terms results from our other specifications, so this test does not directly speak to their
increases. merits.
A S FA N D YA R M I R AND DYLAN MOORE 857

(A) (B)

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


Figure 7. Incidents event study on the left, casualties event study on the right. Solid lines depict estimated event-study co-
efficients and dotted lines depict confidence intervals (accounting for tehsil-level clustering). Half-year relative to July–
December 2007 is on the x-axis.

available quantitative and qualitative evidence suggests that and Nawagai, Taliban forces interdicted the agency’s major
continued growth or stagnation at preprogram levels are the lines of communication, compelling the Pakistani paramil-
most plausible counterfactual paths for violence in North itary group Bajaur Scouts to scale back their deployments.
Waziristan Agency. The growth of violence in that region A former political agent of Bajaur Agency noted that the
prior to 2008 was driven by political dynamics similar to Pakistani state had largely lost its “writ” to the Al-Qaeda-
those underlying increases in violence in other districts of backed Taliban forces by early 2007.43 Significantly, in con-
FATA before and during the program: the strength of local trast to North Waziristan, there was no break in the Bajaur
organizations within the Pakistan Taliban umbrella commit- Taliban’s subversive activity after the drone program began.
ted to overturning the Pakistani state. Until late 2008, Maulvi Faqir frequently rallied his forces,
Leading up to 2008, Taliban forces in North Waiziristan— sometimes in conventional military formations. In an auda-
led by Baitullah Mehsud—increasingly saw sustained attacks cious August 2008 assault, he captured the Bajaur Agency
against the local state presence as a tool for maximizing administration headquarter in Khar.44 After induction of
control over territory and maintaining the safety of their new Pakistani military forces and aviation assets—which pre-
sprawling infrastructure in Waziristan.40 Military bases, con- cipitated battles in the towns of Loe Sum, Nawagai, and Khar
voys, civilian administration, and the political agent’s offices as part of Operation Sher-Dil—the insurgency experienced
were all targeted. Fighting was especially intense around some losses.45 Many insurgent units moved to the neighbor-
Pakistani military forts and encampments and during the ing Afghanistan province of Kunar, but a sizable number of
military’s attempts at transporting soldiers and supplies in Faqir’s sabotage units remained in Bajaur.46 Those across
a drill called the road opening day (ROD).41 After January the border in Kunar frequently returned for sabotage in Ba-
2008, this trend reversed. The North Waziristan Taliban fac- jaur, including interdicting convoys.47 They also launched
tions and their Al-Qaeda affiliates mostly stopped attacking counterattacks and offensives to extend their perimeter of
forward bases and offices of the Pakistani military and intel- territorial influence.48 According to one Pakistani official
ligence agencies, such as those in Mir Ali, Data Khel, Ghu- who had purview over both Bajaur and North Waziristan,
lam Khan, and Miramshah. Besides low-level targeting of the forces of Maulvi Faqir operated with relatively more free-
suspected civilian informants, the period did not see any dom and latitude than the factions in North Waziristan; se-
sustained attempt by these insurgent groups at large-scale lect tribal elites aligned with the Taliban presented a similar
violence targeting these military installations. This change perspective.
was plausibly the result of the drone program compromising
the capacity of these organizations to mount such assaults.
Modifiable Areal Unit Problem
We support this point with additional qualitative evidence in
next section. It should be noted that the departure from parallel trends
Bajaur Agency provides a telling qualitative sketch of documented above might not have been obvious when look-
one possible counterfactual scenario for North Waziristan.42 ing at figure 3.49 In these graphs, the pre-2008 patterns of vi-
As in North Waziristan, this region had a local Taliban olence in and outside North Waziristan appear much more
faction—led by Maulvi Faqir Muhammed—which was active similar. This difference results from a change in the unit of
in the preprogram period. With the help of select teams of
Al-Qaeda fighters based in areas such as Damadola, Khar, 43
Interview, Pakistan, 2016.
44
Interview, Pakistan, 2016.
40 45
Interview, Peshawar, 2016. Interview, Bajaur Agency, 2017.
41 46
The October 2007 Battle of Mir Ali was triggered by a Taliban assault on a Interview Bajaur Agency, 2017.
47
military convoy during a routine ROD. For example, a US Special Operations convoy involved in training Pakistani
42
One reason that Bajaur makes for a telling comparison is that—as shown paramilitary was interdicted and bombed in February 2010 on the border between
in figure 1—the 2004 flight boxes included parts of Bajaur. This suggests that, Lower Dir and Bajaur Agency.
48
like North Waziristan, Bajaur was of strategic interest to the United States and that For example, a counteroffensive was launched in the Batwar area of Bajaur
Pakistan was initially willing to permit limited drone deployments there—though in September 2012.
49
this had changed by 2008. We thank an anonymous reviewer for highlighting this discrepancy.
858 Drones, Surveillance, and Violence

Table 4. Results decomposition

(1) (2) (3) (4) (5) (6)


Attacks Attacks Attacks Casualties Casualties Casualties

treat.nwa −1.039* −0.786* −5.698* −4.064*


(0.259) (0.195) (1.406) (0.966)
Strikes −0.127* −0.0646* −0.740* −0.418
(0.0372) (0.0283) (0.281) (0.276)
Observations 3638 3638 3638 3638 3638 3638
WB p-value (Program) 0.00200 0.00200 0.00200 0.00400
WB p-value (Strikes) 0.00200 0.00600 0.00400 0.100
Year FE X X X X X X

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


Tehsil FE X X X X X X

Notes: Standard errors in parentheses. *p < 0.05

analysis. The dependent variables in that figure are monthly Decomposing Results
totals of attacks and casualties inside and outside North
Our methodological approach in the preceding sections
Waziristan, whereas the dependent variables in our regres-
differs substantially from that employed in previous work
sions are instead tehsil-level totals. Because our sample
on effects of drones and air power. Johnston and Sar-
contains the nine tehsils inside North Waziristan and twenty-
bahi (2016)—also investigating the US drone program
three outside the flight box, even if the parallel-trends as-
in Pakistan—documented a negative correlation between
sumption were satisfied when comparing total violence in
drone strikes and insurgent violence occurring in the same
the control and treatment areas, it would not (in general)
district-week observation. As we have noted, the program’s
be satisfied when comparing average violence per tehsil be-
total effect need not be composed of simply the aggregation
tween those areas. It is the latter parallel-trends assumption
of short-run responses to individual strikes, especially if the
that is needed for causal interpretation of estimates from
surveillance dimension of the program led to anticipatory
our base specification.
effects. Here, we probe how much of the program-level cor-
This makes clear that our application suffers from a
relation we document might be accounted for by the impact
variant of the modifiable areal unit problem.50 The scale
of individual drone strikes documented in the previous lit-
of our dependent variables is not invariant to changes in
erature.
our choice of a spatial unit of aggregation. Consequently,
Table 4 presents the results. Columns (1) and (4) con-
the particular parallel-trends assumption needed for causal
tain estimates from our base specification for incidents and
interpretation of our panel regressions varies with this
casualties dependent variables, respectively, (for reference
choice.51 We can see no obvious reason to prefer any par-
purposes).52 In columns (2) and (5), we present results of
ticular level of spatial aggregation over another a priori.
a regression with month-year and tehsil fixed effects and a
That said, the parallel-trends assumption underlying a
variable measuring the number of drone strikes occurring
causal interpretation of our panel regressions is more con-
within a given month in the district a tehsil is located in. To
servative than that which would accompany an analysis
be clear, although our observations are at the tehsil-month
based on aggregation of our data into two spatial units: in-
level, district-month level drone-strike coding allows the ef-
side and outside North Waziristan Agency. Since there are
fect of strikes to reach across an entire district. This specifi-
relatively more tehsils outside the flight box, our analysis
cation is the most similar to what has been done in the pre-
implicitly lessened the magnitude of the postprogram in-
vious literature.53 These estimates document a statistically
crease in violence in those areas, thus also lessening the
significant negative correlation between drone strikes and
implied counterfactual increase in violence in North
insurgent violence in a given month in the area in which
Waziristan. Nonetheless, our choice of tehsil-level aggrega-
the strikes occurred, consistent with Johnston and Sarbahi
tion remains arbitrary.
(2016).
Columns (3) and (6) display results from our baseline
Probing Mechanisms specification with the drone strikes variable added as a re-
gressor. The estimates contain several interesting results.
In this section, we probe the mechanisms mediating the neg- First, notice that the estimated coefficient on treat·nwa de-
ative association between the US drone program and insur- creases in size significantly relative to the baseline specifica-
gent violence documented above in two steps. First, we ex- tion for both incidents and casualties dependent variables.
amine the magnitude of the effect that plausibly results from This suggests that the short-run effect of drone strikes may
kinetic effects. We do this by simply aggregating the local account for a portion of the total program impact. How-
effects of individual drone strikes undertaken as part of the ever, the estimates on treat·nwa are about 75 percent of their
drone program. Next, we consider limited but valuable qual- original size in both cases, suggesting that—as measured
itative evidence on the program’s anticipatory effects. This by a district-month-level variable—the immediate effects of
work is far from definitive but demonstrates the plausibility drone strikes do not account for most of the correlation we
of both the kinetic and anticipatory mechanisms. have detected. This suggests that most of the correlation we
have detected between the onset of the drone program and

50 52
See Fotheringham and Wong (1991) for a discussion. These estimates were previously presented in tables 2 and 3.
51 53
This problem is not unique to our paper but affects any other difference-in- Our coding of the drone-strike variable is similar to that of Johnston and
differences design using spatially aggregated count variables. Sarbahi (2016), who code their drone strikes variable at the district-week level.
A S FA N D YA R M I R AND DYLAN MOORE 859

insurgent violence cannot be explained as simply the aggre- the the North Waziristan Agency. As drones began to hover
gation of the impact of many individual drone strikes—at overhead frequently, the anticipatory effects set in, forcing
least, not when measured by a district-month-level variable. the groups on the defensive. Members of Al-Qaeda and
Comparing columns (3) and (6) to columns (2) and the Pakistan Taliban interviewed for the study noted that
(4) also shows that introducing the treat·nwa variable al- the surge in surveillance and the resulting anticipation
most halves the magnitude of the correlation between drone of strikes became “inescapable,” which substantially con-
strikes and insurgent violence. This indicates that the corre- strained operational coordination.55 One Taliban operative
lations presented in columns (2) and (4) may partially re- noted: “Drones were an absolute headache for us and other
flect the effect of the drone program beyond the short-run jihadi groups [in the region] because there is no solution
effects of drone strikes (since most strikes took place in the for them.”56
North Waziristan Agency after the program began). Insofar The evidence is telling regarding the three theoretically
as this is the case, previous work examining the impact of in- expected challenges for the targeted groups: movement,

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


dividual drone strikes, which included pre–drone program communication, and trust. For example, as surveillance
periods and districts outside the North Waziristan Agency and targeting by drones intensified in early 2008, cadres of
in their analysis, may have suffered from a kind of omitted- both Al-Qaeda and the Pakistan Taliban were compelled
variable bias. to give up activities that could identify them via overhead
What best explains the isolated-out effect of individual surveillance. While it did not eliminate all movement, lead-
strikes and the sizable residual effect of the drone program? ers and cells struggled in moving around due to concern
The isolated effect of strikes is plausibly best explained by ki- of being detected. Multiple members of the Taliban and
netic effects; that is, the targeted groups experienced dam- Al-Qaeda noted that in order to evade intensified surveil-
age in the form of leadership decapitation and loss of per- lance, they stopped moving in large groups. Some noted
sonnel, which set back the operational capability of the “strict standard procedures against moving in four-wheel
group. This is consistent with the interpretation provided vehicles.”57 Even “alternative means of movement—like
by Johnston and Sarbahi (2016). However, the explanation by foot or motorbikes—became very high risk.” This cur-
for the residual effect is less clear. There are three possi- tailed operational capacity of the “marakiz [units/centers]
bilities: pure kinetic effects; pure anticipatory effects; and a in Waziristan by 2009,” according to one Pakistan Taliban
combination of kinetic and anticipatory effects. We believe leader.58 Al-Qaeda leader Sheikh Atiya’s letters to Bin Laden
kinetic effects alone cannot plausibly explain the residual ef- detail similar challenges: “We really worry because of our
fect. A kinetic effects–based explanation would suggest that present security situation and the airstrikes really wore us
drone strikes did lasting damage to the capabilities of the down” (Justice 2015a, 12).
targeted groups, which extended far beyond the month of Al-Qaeda and the Taliban faced severe within group trust
the strike. This is not likely because Al-Qaeda and the Pak- issues as the drone program set in.59 Commanders felt that
istan Taliban—the two main targets of the program—were the US drone operation relied on local spies. They also
relatively capable organizations, able to recover from losses thought the US government could exploit slipups in oper-
under ordinary circumstances (Jordan 2014; Long 2014; ational security by less cautious/disciplined cadres. As early
Staniland 2014; Toft and Zhukov 2015). A more plausible as 2008, senior and midlevel commanders of the groups be-
account is one where kinetic effects interacted with antici- gan to regulate who they interacted with, limiting them-
patory effects in first damaging and then constraining the selves to trustworthy and capable cadres.60 This filtering
recovery of these groups. A pure anticipatory effects story of within group interaction brought principal-agent and
could also account for the residual association between the intra-agent relationships under stress. In a letter to Bin
drone program and violence. Such an account would sug- Laden, Sheikh Atiya bemoaned the operational breakdown
gest that groups stayed continuously disorganized because due to trust issues: “We bought some quantities of ammu-
of the sustained surveillance that induced high levels of per- nition and devised some simple plans. We are facing dif-
ceived risk among insurgents. ficulties due to . . . the abundance of spies operating in
our areas” (Justice 2015b, 1). A Pakistan Taliban operative
noted periods of intense distrust between top and midrank-
Qualitative Evidence on Mechanisms
ing leaders—including Hakimullah Mehsud and Wali-ur-
Here we draw on qualitative evidence to argue the impor- Rehman Mehsud.61 An Al-Qaeda operative noted: “Since
tance of the mechanism of anticipatory effects of the drone the beginning of drone attacks, the jihadi organizations
program. An important caveat is that we do not claim the have suffered immense pain. The pain became worse be-
anticipatory effects mechanisms is the dominant driver of cause it could not be treated. It enhanced distrust within ji-
the drop in insurgent violence. Our purpose is to highlight hadist organizations and among their people. We knew that
its significance, given that it remains an understated mech- targeting by drones was not possible without a high-quality
anism. We draw on two sources of evidence: interviews con- spying network on the ground.”62
ducted in Pakistan, including with members of Pakistan Tal- Al-Qaeda and the Pakistan Taliban also found themselves
iban and Al-Qaeda, and correspondences between Osama handicapped in communication. Leaders and midlevel com-
Bin Laden and his subordinate commanders in the North manders of both groups reduced their use of interceptable
Waziristan Agency, which were captured during the US raid means of communication. Sheikh Atiya wrote to Bin Laden
on the Bin Laden compound in Abbotabad, Pakistan.54 that “we [have] put a ban on communications except with a
Al-Qaeda and the Pakistan Taliban experienced consider-
55
able operational disruption because of the drone program. Interview Pakistan, 2017.
56
Until late 2007, the Pakistan Taliban, often with the guid- Interview, Pakistan, 2016.
57
ance of Al-Qaeda’s master trainers and its Pakistani factions, Interview, Pakistan, 2016.
58
Interview, Pakistan, 2016.
conducted sophisticated, manpower-intensive assaults in 59
Interviews, Pakistan, 2017.
60
On killings of suspected spies, see Reese, Ruby, and Bauer (2017).
54 61
For detailed process tracing of how the US drone war shaped trajectories of Interview, Pakistan, 2016.
62
the targeted groups in North Waziristan, see Mir (2018). Interview, Pakistan, 2017.
860 Drones, Surveillance, and Violence

special permission” (Justice 2015b, 1). Multiple Taliban re- local partner capacity and cooperation for effective coun-
spondents noted dire challenges in the use of messengers terterrorism campaigns. The negotiation process between
and technical means for communication from 2009 to 2014: the US and Pakistani governments at the onset of the pro-
“We were told to avoid communication devices, including gram shows that Pakistani capacity and cooperation was a
wireless sets.”63 key ingredient for realizing the capabilities of the program.
Finally, our work challenges the popularly held notion that
“drones create more terrorists” (Abbas 2013). Our evidence
Implications and Conclusion suggests two possibilities: either the drone program did not
This study shows how a drone program can shape one key di- facilitate insurgent recruitment, or insofar as it did, insur-
mension of internal conflict: insurgent violence. Our work gent groups struggled to integrate these new recruits into
has implications for a number of scholarly and policy de- their organizations. Our focus on anticipatory effects speaks
bates. To begin, we show the transformative dimensions primarily to the latter possibility. The crisis of in-group trust

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


of drones for internal conflict (Stulberg 2007; Boyle 2015; may have imposed constraints on the extent to which insur-
Horowitz et al. 2016; Zegart 2018). Existing scholarship pro- gents could benefit from the availability of recruits.
vides valuable but limited conceptualization of the capabil- Policymakers, however, should be very cautious in in-
ity drones bring to the modern battlefield (Horowitz et al. terpreting our results for design of future campaigns. We
2016). Our analysis contributes by showing that when armed remain uncertain about the level of capabilities required
aerial drones are used for pervasive surveillance while be- in other weak state contexts like Afghanistan and Yemen.
ing combined with an extensive intelligence analysis bureau- While we contribute new information on the secret coun-
cracy and broad targeting authority, they can bring substan- terterrorism pact between the US and Pakistani govern-
tial pressure on their insurgent targets. ments, much remains unknown about the quantum and
Our findings complicate empirical debates on the effects composition of US-Pakistan intelligence sharing and US
of drones, challenging the view that drone strikes fuel insur- surveillance technologies central to the program. Such de-
gencies in the areas where they are carried out (Kilcullen tails are critical to establishing the generalizability of our
and Exum 2009; Boyle 2013; Mazzetti and Shane 2013). results.
If the strength of the Pakistani insurgency is captured by Finally, while our theoretical position attributes relatively
violence, we find evidence that the US drone program less importance to civilian behaviors and preferences in
weakened it in regions of the flight box. In addition, we shaping conflict processes, we do not condone harm to civil-
complement and extend Johnston and Sarbahi (2016), ians by drone strikes. Indeed, our evidence and theoretical
who show that an average drone strike in Pakistan’s tribal perspectives on program efficacy alone cannot justify the
areas was associated with a short-run reduction in prox- use of drones. We remain extremely concerned about the re-
imate violence. We show that, viewed in isolation, their ported levels of civilian casualties in US drone campaigns—
findings underestimate the impact of US counterterrorism including the one in Pakistan. Available estimates by
on insurgent violence in Pakistan. watchdogs like the London based Bureau of Investigative
Our findings contrast with the scholarly view that the use Journalism report that the US government’s strikes killed
of air-power against insurgents is counterproductive (Pape 426 civilians at a minimum and 961 civilians at a maximum
1996; Kocher et al. 2011; Dell and Querubin 2017). Much of in Pakistan.65 When combined with our findings, this trou-
this literature situates the ineffectiveness of air-power in the blingly suggests that strategic gains are possible even when
collateral damage caused by air strikes and the resulting in- civilians are harmed.
creased support for the insurgency amongst the civilian pop- In case of limited battlefield-related functional incentives
ulation. Our work suggests—perhaps troublingly—that the to protect civilians, we worry that states may be prone to civil-
US drone program in Pakistan undermined the insurgency ian abuse. We call for an even greater focus on civilian pro-
despite harming civilians (Clinic and NYU School of Law tection in counterterrorism by drones on purely ethical and
2012; Director of National Intelligence 2016; Investigative legal grounds.
Journalism 2017). This suggests that the sustained kinetic
and anticipatory effects of the program outweighed any
countervailing effects, such as those due to increased civil- Supplemental Information
ian support for the insurgency. Relatedly, our study has im- Replication data and code as well as supplementary infor-
plications for the population-centric model of counterinsur- mation with additional tests and details on the research
gency. This view argues that winning over civilians—through design are available at www.asfandyarmir.com and at the
security and/or service provision—is critical for state forces International Studies Quarterly data archive.
to gain intelligence.64 Our work implies that if states can
build robust surveillance infrastructures, they can minimize
the need of civilian collaboration to intelligence gathering.
References
Our work offers three key policy implications. First, our
findings validate a common view among counterterrorism ABBAS, HASSAN. 2013. “How Drones Create More Terrorists.” Atlantic.
operators about the importance of sustained aerial surveil- https://www.theatlantic.com/international/archive/2013/08/how-
lance in safe havens and weak states (Task Force 2013, drones-create-more-terrorists/278743/.
ABRAHMS, MAX, AND PHILIP B. K. POTTER. 2015. “Explaining Terrorism: Leader-
12–16). Our analysis suggests that combining surveillance
ship Deficits and Militant Group Tactics.” International Organization 69
with striking capabilities provides counterinsurgency and (2): 311–42.
counterterrorism forces with valuable additional coercive ALSAN, MARCELLA, AND MARIANNE WANAMAKER. 2018. “Tuskegee and the Health
leverage. Second, our findings highlight the importance of of Black Men.” Quarterly Journal of Economics 133 (1): 407–55.

63
Interview, Pakistan, 2016.
64 65
See Nagl et al. (2008), Berman et al. (2011), Condra and Shapiro (2012), Our research doesn’t offer a new estimate of civilian harm, given the chal-
Berman and Matanock (2015), and Shaver and Shapiro (forthcoming) on the lenge of reaching a representative sample of the affected population in Pakistan’s
importance of civilian collaboration for counterinsurgency. Waziristan region.
A S FA N D YA R M I R AND DYLAN MOORE 861

ANGRIST, JOSHUA D., AND JORN-STEFFEN PISCHKE. 2008. Mostly Harmless Econo- INTERNATIONAL, AMNESTY. 2013. “Will I Be Next: Drone Strikes in
metrics: An Empiricist’s Companion. Princeton, NJ: Princeton University Pakistan.” Amnesty International. October 21, 2013. https://www.
Press. amnestyusa.org/reports/will-i-be-next-us-drone-strikes-in-pakistan/.
ARKIN, WILLIAM M. 2015. Unmanned: Drones, Data, and the Illusion of Perfect INVESTIGATIVE JOURNALISM, BUREAU OF. 2017. “Drone War.” Bureau of Investigative
Warfare. New York: Little, Brown and Company. Journalism. https://www.thebureauinvestigates.com/projects/drone-
BALCELLS, LAIA, AND PATRICIA JUSTINO. 2014. “Bridging Micro and Macro Ap- war.
proaches on Civil Wars and Political Violence: Issues, Challenges, and JOHNSTON, PATRICK B. 2012. “Does Decapitation Work? Assessing the Effec-
the Way Forward.” Journal of Conflict Resolution 58 (8): 1343–59. tiveness of Leadership Targeting in Counterinsurgency Campaigns.”
BERMAN, ELI, AND AILA M. MATANOCK. 2015. “The Empiricists’ Insurgency.” An- International Security 36 (4): 47–79.
nual Review of Political Science 18 (1): 443–64. JOHNSTON, PATRICK, AND ANOOP K. SARBAHI. 2016. “The Impact of US Drone
BERMAN, ELI, JACOB N. SHAPIRO, AND JOSEPH H. FELTER. 2011. “Can Hearts and Strikes on Terrorism in Pakistan and Afghanistan.” International Studies
Minds Be Bought? The Economics of Counterinsurgency in Iraq.” Jour- Quarterly 60 (2): 203–19.
nal of Political Economy 119 (4): 766–819. JORDAN, JENNA. 2009. “When Heads Roll: Assessing the Effectiveness of Lead-

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


BERTRAND, MARIANNE, ESTHER DUFLO, AND SENDHIL MULLAINATHAN. 2004. “How ership Decapitation.” Security Studies 18 (4): 719–55.
Much Should We Trust Differences-in-Differences Estimates?” Quarterly ———. 2014. “Attacking the Leader, Missing the Mark: Why Terrorist
Journal of Economics 119 (1): 249–75. Groups Survive Decapitation Strikes.” International Security 38 (4): 7–
BOYLE, MICHAEL J. 2013. “The Costs and Consequences of Drone Warfare.” 38.
International Affairs 89 (1): 1–29. JUSTICE, US DEPARTMENT OF. 2015a. “Motion in Limine to Admit Bin Laden
——— 2015. “The Race for Drones.” Orbis 59 (1): 76–94. Docs, Government Exhibit 421 10-CR-019(S-4)(RJD).” http://kronosa
BYMAN, DANIEL. 2013. “Why Drones Work: The Case for Washington’s Weapon dvisory.com/Abid.Naseer.Trial_Abbottabad.Documents_Exhibits.
of Choice.” Foreign Affairs 92 (4): 32–43. 403.404.405.420thru433.pdf.
CAMERON, A. COLIN, JONAH B. GELBACH, AND DOUGLAS L. MILLER. 2008. ———. 2015b. “Motion in Limine to Admit Bin Laden Docs,
“Bootstrap-Based Improvements for Inference with Clustered Errors.” Government Exhibit 429 10-CR-019(S-4)(RJD).” http://
Review of Economics and Statistics 90 (3): 414–27. kronosadvisory.com/Abid.Naseer.Trial_Abbottabad.Documents_
CLINIC, STANFORD INTERNATIONAL HUMAN RIGHTS & CONFLICT RESOLUTION, AND Exhibits.403.404.405.420thru433.pdf.
GLOBAL JUSTICE CLINIC (GJC) AT NYU SCHOOL OF LAW. 2012. “Death, KALYVAS, STATHIS N. 2006. The Logic of Violence in Civil War. Cambridge: Cam-
Injury and Trauma to Civilians from US Drone Practices in Pak- bridge University Press.
istan, International Human Rights and Conflict Resolution Clinic.” KHAN, ISMAIL. 2006. “Forces Militants Heading for Truce.” Dawn, June 23,
Stanford Law School and Global Justice Clinic, NYU School of Law. 2006. http://www.dawn.com/news/198292/forces-militants-heading-
September 25, 2012. https://www-cdn.law.stanford.edu/wp-content/ for-truce.
uploads/2015/07/Stanford-NYU-LIVING-UNDER-DRONES.pdf. KILCULLEN, DAVID, AND ANDREW MCDONALD EXUM. 2009. “Death from Above,
CONDRA, LUKE N., AND JACOB N. SHAPIRO. 2012. “Who Takes the Blame? The Outrage Down Below.” New York Times, May 16, 2009. https://
Strategic Effects of Collateral Damage.” American Journal of Political Sci- www.nytimes.com/2009/05/17/opinion/17exum.html.
ence 56 (1): 167–87. KOCHER, MATTHEW ADAM, THOMAS B. PEPINSKY, AND STATHIS N. KALYVAS. 2011.
CRONIN, AUDREY KURTH. 2013. “Why Drones Fail: When Tactics Drive Strategy.” “Aerial Bombing and Counterinsurgency in the Vietnam War.” Ameri-
Foreign Affairs 92 (4): 44–54. can Journal of Political Science 55 (2): 201–18.
DELL, MELISSA, AND PABLO QUERUBIN. 2017. “Nation Building through For- LAMB, CHRISTINA, CHRIS WOODS, AND RAHIMULLAH YUSUFZAI. 2012. “Covert
eign Intervention: Evidence from Discontinuities in Military Strate- CIA Drones Kill Hundreds of Civilians.” Sunday Times, Febru-
gies.” Quarterly Journal of Economics 133 (2): 701–64. ary 5, 2012. https://www.thetimes.co.uk/article/covert-cia-drones-kill-
DEVELOPMENT, SIGINT. 2012. “SKYNET: Applying Advanced Cloud hundreds-of-civilians-qm9hxp0ftdm.
Based Behavior.” https://assets.documentcloud.org/documents/ LIN-GREENBERG, ERIK. 2018. “Eyes and Ears of Freedom: The Intelligence
2074625/skynet-applying-advanced-cloud-based-behavior.pdf. Backbone of America’s Drone Program.” Columbia University Work-
DIRECTOR OF NATIONAL INTELLIGENCE, OFFICE OF THE. 2016. “Summary of ing Paper. http://eriklg.com/wp-content/uploads/2018/04/Proofed-
Information Regarding U.S. Counterterrorism Strikes Outside Ar- Find-em-First__April-2018.pdf.
eas of Active Hostilities.” https://www.dni.gov/files/documents/ LONG, AUSTIN. 2014. “Whack-a-Mole or Coup De Grace? Institutionalization
Newsroom/Press%20Releases/DNI+Release+on+CT+Strikes+ and Leadership Targeting in Iraq and Afghanistan.” Security Studies 23
Outside+Areas+of+Active+Hostilities.PDF. (3): 471–512.
FAIR, C. CHRISTINE. 2014. “Drones, Spies, Terrorists, and Second- MAZZETTI, MARK. 2013. The Way of the Knife: The CIA, A Secret Army, and A War
Class Citizenship in Pakistan.” Small Wars & Insurgencies 25 (1): at the Ends of the Earth. New York: Penguin.
205–35. MAZZETTI, MARK, AND SCOTT SHANE. 2013. “As New Drone Policy Is
FAIR, C. CHRISTINE, KARL KALTENTHALER, AND WILLIAM MILLER. 2015. “Pakistani Weighed, Few Practical Effects Are Seen.” New York Times, March 21,
Political Communication and Public Opinion on US Drone Attacks.” 2013. https://www.nytimes.com/2013/03/22/us/influential-ex-aide-
Journal of Strategic Studies 38 (6): 852–72. to-obama-voices-concern-on-drone-strikes.html.
FINKEL, EVGENY. 2015. “The Phoenix Effect of State Repression: Jewish Resis- MCCHRYSTAL, GENERAL STANLEY. 2013. My Share of the Task: A Memoir. New York:
tance during the Holocaust.” American Political Science Review 109 (2): Penguin.
339–53. MESQUITA, ETHAN BUENO DE, C. CHRISTINE FAIR, JENNA JORDAN, RASUL BAKHSH
FLYNN, MICHAEL T., RICH JUERGENS, AND THOMAS L. CANTRELL. 2008. “Em- RAIS, AND JACOB N. SHAPIRO. 2014. “Measuring Political Violence in Pak-
ploying ISR SOF Best Practices.” Joint Force Quarterly 50: 56–61. istan: Insights from the BFRS Dataset.” Conflict Management and Peace
http://www.dtic.mil/dtic/tr/fulltext/u2/a516799.pdf. Science 32 (5): 536–58.
FOTHERINGHAM, A. STEWART, AND DAVID W. S. WONG. 1991. “The Modifiable MIR, ASFANDYAR. 2018. “What Explains Counterterrorism Effectiveness? Evi-
Areal Unit Problem in Multivariate Statistical Analysis.” Environment dence from the US Drone War in Pakistan.” International Security 43
and Planning A: Economy and Space 23 (7): 1025–44. (2): 45–83.
FUHRMANN, MATTHEW, AND MICHAEL C. HOROWITZ. 2017. “Droning On: Explain- MORA, RICARDO, AND ILIANA REGGIO. 2017. “Alternative Diff-in-diffs Esti-
ing the Proliferation of Unmanned Aerial Vehicles.” International Orga- mators with Several Pretreatment Periods.” Econometric Reviews 1–
nization 71 (2): 397–418. 22.
GOODWIN, JEFF. 2001. No Other Way Out: States and Revolutionary Movements, NAGL, JOHN A., DAVID H. PETRAEUS, JAMES F. AMOS, AND SARAH SEWALL. 2008. The
1945–1991. Cambridge: Cambridge University Press. US Army/Marine Corps Counterinsurgency Field Manual. Chicago: Univer-
HAZELTON, JACQUELINE L. 2017. “Drone Strikes and Grand Strategy: Toward a sity of Chicago Press.
Political Understanding of the Uses of Unmanned Aerial Vehicle At- NIELSEN, RICHARD. 2016. “Can Ideas Be ‘Killed?’ Evidence from Coun-
tacks in US Security Policy.” Journal of Strategic Studies 40 (1-2): 68–91. terterror Targeting of Jihadi Ideologues.” MIT Working Paper.
HOROWITZ, MICHAEL C., SARAH E. KREPS, AND MATTHEW FUHRMANN. 2016. “Sepa- http://aalims.org/uploads/decap_AALIMS2014.pdf.
rating Fact from Fiction in the Debate over Drone Proliferation.” Inter- PAPE, ROBERT A. 1996. Bombing to Win: Air Power and Coercion in War. Ithaca,
national Security 41 (2): 7–42. NY: Cornell University Press.
862 Drones, Surveillance, and Violence

——— 2017. “Don’t Overestimate Drone Strikes’ Power to Kill High STANILAND, PAUL. 2014. Networks of Rebellion: Explaining Insurgent Cohesion and
Value Targets.” The Cipher Brief, September 10, 2017. https://www. Collapse. Ithaca, NY: Cornell University Press.
thecipherbrief.com/dont-overestimate-drone-strikes-power-kill-high- STANILAND, PAUL, ASFANDYAR MIR, AND SAMEER LALWANI. 2018. “Politics and
value-targets. Threat Perception: Explaining Pakistani Military Strategy on the North
PRICE, BRYAN C. 2012. “Targeting Top Terrorists: How Leadership Decapi- West Frontier.” Security Studies 27 (4): 535–74.
tation Contributes to Counterterrorism.” International Security 36 (4): STULBERG, ADAM N. 2007. “Managing the Unmanned Revolution in the US
9–46. Air Force.” Orbis 51 (2): 251–65.
REESE, MICHAEL J., KEVEN G. RUBY, AND VINCENT BAUER. 2017. “Selective Vio- TAHIR, MADIHA. 2015. “Bombing Pakistan: How Colonial Legacy Sus-
lence and Civilian Collaboration: Evidence from Pakistan.” Presented tains American Drones.” Costs of War. https://watson.brown.edu/
at the 113th Annual Meeting of the American Political Science Associ- costsofwar/files/cow/imce/papers/2015/Tahir_FINAL%20Costs%
ation, San Francisco. 20of%20War%206.7.15.pdf.
SAVAGE, CHARLIE, AND ERIC SCHMITT. 2017. “Trump Eases Combat Rules in TASK FORCE, ISR. 2013. “ISR Support to Small Footprint Operations—
Somalia Intended to Protect Civilians.” New York Times, March 30, Somalia/Yemen.” ISR Task Force Requirements and Analysis Division.

Downloaded from https://academic.oup.com/isq/article/63/4/846/5531761 by Georgetown University user on 04 October 2022


2017. https://www.nytimes.com/2017/03/30/world/africa/trump-is- https://theintercept.com/document/2015/10/14/small-footprint-
said-to-ease-combat-rules-in-somalia-designed-to-protect-civilians.html. operations-2-13/#page-1.
SHAH, AQIL. 2018. “Do US Drone Strikes Cause Blowback? Evidence from TOFT, MONICA DUFFY, AND YURI M. ZHUKOV. 2015. “Islamists and Nationalists:
Pakistan and Beyond.” International Security 42 (4): 47–84. Rebel Motivation and Counterinsurgency in Russia’s North Caucasus.”
SHAVER, ANDREW, AND JACOB SHAPIRO. Forthcoming. “The Effect of Civil- American Political Science Review 109 (2): 222–38.
ian Casualties on Wartime Informing: Evidence from the Iraq War.” WEINSTEIN, JEREMY M. 2006. Inside Rebellion: The Politics of Insurgent Violence.
Journal of Conflict Resolution. https://scholar.princeton.edu/sites/ Cambridge: Cambridge University Press.
default/files/jns/files/hicn_workingpaper210_shavershapiro.pdf. WOOD, ELISABETH JEAN. 2003. Insurgent Collective Action and Civil War in El Sal-
SHULTZ, RICHARD H. 2017. “US Counterterrorism Operations during the Iraq vador. Cambridge: Cambridge University Press.
War: A Case Study of Task Force 714.” Studies in Conflict & Terrorism 40 WOODWARD, BOB. 2011. Obama’s Wars. New York: Simon & Schuster.
(10): 809–37. YUSUFZAI, RAHIMULLAH. 2009. “Assessing the Progress of Pakistan’s South
SIGINT LIAISON OFFICER, ISLAMABAD. 2006. “The Day the Earth Shook Waziristan Offensive.” CTC Sentinel 2 (12): 8–12.
in Pakistan.” January 12, 2006. https://theintercept.com/snowden- ZEGART, AMY. 2015. “The Coming Revolution of Drone Warfare.” The Wall
sidtoday/4755482-the-day-the-earth-shook-in-pakistan. Street Journal. https://www.wsj.com/articles/amy-zegart-the-coming-
SMITH, MEGAN, AND JAMES WALSH. 2013. “Do Drone Strikes Degrade Al Qaeda? revolution-of-drone-warfare-1426720364.
Evidence from Propaganda Output.” Terrorism and Political Violence 25 ZEGART, AMY. 2018. “Cheap Fights, Credible Threats: The Future of Armed
(2): 311–27. Drones and Coercion.” Journal of Strategic Studies 1–41.

You might also like