See It/Shoot It
The Secret History of the CIA's Lethal Drone Program
See It/Shoot It
Online Description
An illuminating study tracing the evolution of drone technology and counterterrorism policy from the Reagan to the Obama administrations This eye-opening study uncovers the history of the most important instrument of U.S. counterterrorism today: the armed drone. It reveals that, contrary to popular belief, the CIAâs covert drone program is not a product of 9/11. Rather, it is the result of U.S. counterterrorism practices extending back to an influential group of policy makers in the Reagan administration. Tracing the evolution of counterterrorism policy and drone technology from the fallout of Iran-Contra and the CIAâs âEagle Programâ prototype in the mid-1980s to the emergence of al-Qaeda, Fuller shows how George W. Bush and Obama built upon or discarded strategies from the Reagan and Clinton eras as they responded to changes in the partisan environment, the perceived level of threat, and technological advances. Examining a range of counterterrorism strategies, he reveals why the CIAâs drones became the United Statesâ preferred tool for pursuing the decades-old goal of preemptively targeting anti-American terrorists around the world.
đŤ Author Background
Christopher J. Fuller is an Associate Professor (Reader) in Modern U.S. History at the University of Southampton, specializing in American foreign policy, terrorism/counterterrorism, and security studies. His research focuses on how technology, intelligence, and law interact in U.S. responses to terrorism, from the Cold War to the postâ9/11 era. He has published on U.S. cyber (in)security and the broader security implications of the Internet, using âapplied historyâ to inform contemporary policy debates. See It/Shoot It is his major monograph on drones and the CIA, drawing heavily on declassified documents, congressional hearings, legal scholarship, and investigative journalism.Â
đ Authorâs Main Issue / Thesis
Fullerâs central claim is that the CIAâs lethal drone campaign is not a radical postâ9/11 innovation but the culmination of a decadesâlong search for a âsee it/shoot itâ capability against terroristsâan incremental convergence of technology, legal authority, and political will. He argues that since NSDD 138 (1984), U.S. presidents have treated terrorism as a nationalâsecurity threat warranting preemptive lethal force anywhere in the world, including in states âunable or unwillingâ to deal with terrorists on their territory (a logic later used for drones). The drone campaign thus marks a return to, not a departure from, Reaganâera counterterrorism ideas. Fuller contends that drones have been tactically and operationally effective at decapitating alâQaedaâs core and denying safe havens, but they have not ended the broader jihadist movement. Finally, he highlights how a âcovert action pendulumââoscillations between enthusiasm for CIA paramilitary action and backlash against itâshaped both the adoption and the constraints of lethal drones.
đ§ OneâParagraph Overview
See It/Shoot It traces how the United States moved from the Reagan administrationâs rhetorical âwar on terrorismâ to the CIAâs highly routinized drone campaign in Pakistan and Afghanistan. Fuller shows that lessons from failed proxy operations (Fadlallah), fraught alliance politics (Achille Lauro), and imprecise tools (cruise missiles, proxy militias, renditions, JSOC raids) gradually pushed U.S. policymakers toward a persistent, precise, and legally rationalized tool for targeting terrorists at distance. He follows the institutional story of the CIAâs Counterterrorism Center (CTC) from the 1980s âRadio Shack solutionâ (Eagle Program) through Amber/GNAT and Predator to Obamaâs surge in drone strikes. Along the way, Fuller reconstructs the evolving legal architecture that reinterpreted assassination bans and selfâdefense, the interagency fights over risk and responsibility, and the political calculus that made drones appear âthe only game in townâ by 2009. He then evaluates the effectiveness and unintended consequences of the drone campaign, arguing it succeeded in degrading alâQaedaâs core and aiding the Afghan war effort, but had limited impact on the wider jihadist movement and raised profound accountability and proliferation issues.
đŻ Course Themes Tracker
-
Limits on airpower: Legal bans on assassination, sovereignty concerns, alliance politics, intelligence constraints, basing access (Pakistan), and organizational âcovert action pendulumâ all restrict how drones can be used.
-
Expectations vs. reality: Leaders expected precise surgical decapitation and political lowâcost; reality included persistent legal ambiguity, civilian casualties, adversary adaptation, and partial strategic success.
-
Adaptation & learning: U.S. shifts from proxies and cruise missiles to drones, refines ROE (e.g., signature vs. personality strikes), and rebalances CIA between paramilitary and analytic roles. Adversaries adapt through dispersal, communications discipline, and changes in leadership structures.
-
Efficacy (tactical â political): Tactically lethal and operationally useful (denial of safe haven, force protection), but strategically insufficient to end the âWar on Terrorâ or prevent diffusion of jihadist violence.
-
Alliance/coalition dynamics: Italian and Egyptian reactions in Achille Lauro, Pakistani cooperation/deniability and domestic politics, NATO reliance on CIA drones for crossâborder fires.
-
Domain interplay: Airpower (manned aircraft, cruise missiles) evolves into unmanned platforms; drones depend on spaceâenabled ISR/C2 (satellite links, GPS) and dense intel networks; CIA/JSOC/USAF integration is central.
đ Top Takeaways
-
The CIAâs drone campaign is best understood as the realization of a longâstanding U.S. desire for a âsee it/shoot itâ option against terrorists, not as an ad hoc technological seduction after 9/11.Â
-
Legal reinterpretationsâespecially of EO 12333âs assassination ban and Article 51 selfâdefenseâwere as crucial as technological advances in enabling lethal drones.
-
Negative experiences with proxies, renditions, and largeâfootprint military interventions (Iraq, detention, torture) made drones the comparatively âleast badâ CT tool by the late 2000s.
-
Operationally, drones substantially decimated alâQaedaâs core leadership and denied safe haven in AfPak, while also providing close support and force protection for ISAF in otherwise inaccessible areas.
-
Strategically, the campaignâs success against alâQaeda core coincided with the diffusion and growth of a broader, decentralized jihadist movement, underlining the limits of decapitation and airpower alone.
-
The âcovert action pendulumâ ensures that CIA paramilitary effectiveness comes with recurring political and oversight crises; drones intensified debates about accountability, transparency, and Title 50 vs. Title 10.
-
As technology diffuses, drones shift from being a niche U.S. advantage to a widely available toolâpotentially used by rivals and nonstate actors in hybrid warfare, posing new threats to U.S. forces and societies.Â
đ Sections
Acknowledgments
Summary:
Fullerâs acknowledgments situate See It/Shoot It in a dense network of academic mentors, archivists, and colleagues who helped him navigate the complex legal, technological, and military literature on drones and counterterrorism. He underscores the role of funding bodies and the University of Southampton in enabling extensive archival and FOIA work, as well as travel to the United States. Personal thanks to family members highlight the emotional weight of writing about lethal force and contemporary warfare, underscoring that this is not a detached technical study. The acknowledgments hint at his âapplied historyâ ambition: to write scholarship that informs current policy debates rather than remain purely academic. They also foreshadow the interdisciplinarity of the bookâmixing legal, political, technological, and ethical perspectives.
Key Points:
-
Acknowledges institutional support enabling longâterm research and declassification hunting.
-
Emphasizes interdisciplinary dialogue with legal scholars, security studies experts, and historians.
-
Signals an âapplied historyâ orientation, linking past CT practice to current policy debates.
-
Personal thanks underscore that contemporary history of lethal programs has moral and emotional stakes.
CrossâCutting Themes:
-
Writing contemporary history: reliance on partial, contested sources and FOIA disclosures.
-
Interdisciplinarity: law, technology, and strategy combine in CT airpower debates.
Limits Map (mini):
-
Intelligence/Information: Limits on what can be knownâclassified archives and leakâdriven evidenceâshape Fullerâs narrative.
-
Resource/Time: Research funding and access windows affect which episodes can be reconstructÂed in detail.
-
Political/Legal (metaâlevel): Official secrecy and classification rules limit how transparent any scholarly account can be of CIA operations.
A Note on Language
Summary:
Fuller explains his terminology, aware that words like âterrorist,â âcollateral damage,â and âdroneâ carry political and moral weight. He chooses âAfPakâ as a term of art used by U.S. officials to signal the perceived strategic unity of the AfghanistanâPakistan theater while acknowledging that it masks important regional differences. He retains âcollateral damageâ to match official sources but clarifies it refers to civilian casualties, not a morally neutral category. âDroneâ is used instead of âUAVâ or âUASâ because it is widely recognized in public discourse, though he recognizes its imprecision. Fullerâs language choices aim to mirror the policy world he studies while remaining explicit about their normative implications.Â
Key Points:
-
âAfPakâ reflects U.S. strategic framingâhelpful analytically but potentially flattening local distinctions.
-
âCollateral damageâ is used as official jargon for civilian casualties, not to sanitize harm.
-
âDroneâ is preferred for clarity with general readers despite technical objections.
-
Fuller flags that language influences how we perceive legitimacy and necessity of targeted killing.
CrossâCutting Themes:
-
Legal/Normative limits: How naming shapes what is perceived as lawful or acceptable.
-
Expectations vs. reality: Terms like âsurgical strikeâ can obscure messy onâtheâground effects.
Limits Map (mini):
-
Legal/Normative: Contest over whether terms like âtargeted killingâ or âassassinationâ apply; this underpins legal arguments about drones.
-
Information: Media and official language can obscure or highlight civilian harm, affecting domestic tolerance for airpower in CT.
-
Political: Terminological framing (e.g., âwar on terrorâ vs. âlaw enforcementâ) conditions what options seem available to policymakers.
List of Abbreviations
Summary:
The abbreviations section catalogues the alphabet soup of agencies, legal instruments, and technologies that populate U.S. CT policy and its drone program. It covers organizations such as CTC, JSOC, DoD, ISI, and legal references like EO 12333, NSDD 138, and PDD 39, alongside platforms like Predator, Reaper, Amber, and GNAT. This signals from the outset that Fullerâs story sits at the intersection of law, intelligence, and airpower technology. The dense list itself is an artifact of the bureaucratic complexity that shapes CT decisionâmaking. For SAASS purposes, it doubles as a quick reference for the institutional and doctrinal environment in which drones were adopted.
Key Points:
-
Highlights the multitude of actors (CIA, JSOC, State, NSC, ISI) involved in CT and airpower policy.
-
Shows the importance of specific legal instruments (EO 12333, NSDD 138, PDD 39, AUMF).
-
Identifies key platforms and programs (Eagle Program, Amber, Predator, Reaper).
-
Implies that CT airpower is fundamentally a bureaucratic system of systems, not a single platform choice.
CrossâCutting Themes:
-
Domain interplay: Air, space, ISR/C2, and legal authorities are entangled.
-
Operational limits: Every acronym maps to a constraint or enabling mechanism for CT air operations.
Limits Map (mini):
-
Operational: Multiple agencies with distinct authorities complicate unity of command over drone operations.
-
Strategic: Legal authorities (NSDD, PDDs, AUMF) both empower and constrain CT airpower.
-
Information: Acronymâladen systems risk stovepipes and misunderstanding between military, intelligence, and political leadership.
Prologue: âLet Him Sleepâ
Summary:
Fuller opens with the May 21, 2010 drone strike in Boyya, North Waziristan, that killed Mustafa Abu alâYazid, alâQaedaâs ânumber three,â together with his wife, three daughters, and granddaughter. He reconstructs the decisionâmaking chain from CIA CTC analysts and their wall of photographs commemorating colleagues killed at Khost, through the remote crew guiding an Mâmodel Hellfire, to Pakistani media reports that initially emphasized civilian deaths. The prologue juxtaposes highâtech âsee it/shoot itâ targeting with the visceral image of bodies in the rubble, highlighting the human, political, and moral stakes of remote warfare. Fuller then traces how Western media shifted from nearâsilence on the strike to treating alâYazidâs death as vindication of drones, and finally to more critical accounts of civilian harm. He argues that amid debates about legality, blowback, and effectiveness, one basic question remained underexplored: how did the CIA acquire the ability, authority, and inclination to conduct such lethal drone operations in the first place? That question motivates the book.
Key Points:
-
Boyya strike exemplifies the promise and controversy of precision remote lethal force.
-
CTCâs internal culture (Khost memorial wall) shapes how analysts perceive risk, vengeance, and necessity.
-
Media narratives move from underâreporting, to triumphalism, to concern over civilians.
-
The prologue reframes the debate: before arguing âforâ or âagainstâ drones, we must understand their historical and institutional origins.
CrossâCutting Themes:
-
Limits on airpower: Intelligence uncertainty, collateral damage, and political visibility.
-
Efficacy: Tactical success (HVT killed) vs. strategic/political costs (civilian casualties, Pakistani outrage).
-
Writing contemporary history: Reliance on leaked reports and media coverage to reconstruct classified operations.
Limits Map (mini):
-
Intelligence/Information: Imperfect ground truth about who is in the target building; competing casualty counts from different sources.
-
Legal/Normative: Questions about assassination, civilian protection, and Pakistanâs sovereignty.
-
Political: U.S. nonâacknowledgment vs. Pakistani domestic backlash and international scrutiny.
-
Adversary Adaptation: alâQaedaâs later attempt to control information (delaying confirmation of alâYazidâs death) reflects awareness of media dynamics.
Introduction: âThe True Watersheds in Human Affairs Are Seldom Spottedâ
Summary:
Fuller challenges the conventional view of 9/11 as an absolute âbreakâ in U.S. counterterrorism policy, arguing instead for longâterm continuity. He surveys journalistic and legal critiques of the CIA drone programâfocused on legality, civilian casualties, secrecy, and blowbackâand notes that most analyses treat drones as a novel, technologically driven phenomenon. Against this, he introduces the âcovert action pendulumâ: a cyclical pattern in which enthusiasm for aggressive CIA action leads to scandal and retrenchment (e.g., Church Committee, IranâContra), only for pressures from new threats to push policy back toward covert lethality. The introduction outlines the bookâs core argument that the drone campaign is the embodiment of a longâstanding desire for a âsee it/shoot it option,â made possible by incremental advances in technology and law rather than a sudden postâ9/11 epiphany. Fuller explicitly positions his work as applied history, engaging contemporary legal and ethical debates while grounding them in a detailed institutional narrative. He previews each chapter, showing how Reaganâera initiatives, failed operations, and the evolution of CTC and UAV technology laid the groundwork for Obamaâs drone surge.
Key Points:
-
Critiques dominant narratives that depict drones as a postâ9/11 technological revolution.
-
Introduces âcovert action pendulumâ as a framework for understanding CIA operations.
-
Argues drones realize Richard Clarkeâs âsee it/shoot it optionâ against terrorists.Â
-
Maps out the structure: Reagan rhetoric, Fadlallah/Achille Lauro, CTC/EagleâPredator, Clinton legal architecture, alternative CT tools, and Obamaâs drone campaign.
-
Highlights methodological challengesâsecrecy, contested casualty data, and reliance on NGOs and investigative journalists.
CrossâCutting Themes:
-
Expectations vs. reality: Drones look fundamentally new but are rooted in longâterm strategic desires.
-
Limits on airpower: Legal ambiguity (assassination vs. selfâdefense), Title 10 vs. Title 50, and congressional oversight deficits.
-
Adaptation & learning: Policy evolution is slow, pathâdependent, and shaped by scandal as much as threat perception.
Limits Map (mini):
-
Legal/Normative: EO 11905 and 12333 assassination bans, Article 51, and IHL constrain CT airpower and require reinterpretation before drones can be used.
-
Political: Congressional secrecy constraints and limited oversight enable, but also threaten, the legitimacy of drone campaigns.
-
Information: Public debates rely on partial strike and casualty data (Bureau of Investigative Journalism, New America Foundation).Â
-
Strategic: âWar on Terrorâ against a tactic/abstraction makes measuring success and endâstates inherently difficult.
Chapter 1: âThe Hamlet of Nationsâ: The Rhetoric and Reality of the Reagan Administrationâs Counterterrorism Policy, 1980â1985
Summary:
Fuller examines the Reagan administrationâs proclaimed âwar on terrorism,â centered on rhetoric likening U.S. indecision to âthe Hamlet of nations,â and finds a stark gap between words and deeds. Secretary of State George Shultz, DCI William Casey, and NSC staffer Oliver North form a âcounterterrorism hardlinerâ camp that views terrorism as an existential nationalâsecurity threat requiring proactive, even lethal, measures. They push for NSDD 138 (1984), which designates terrorism as a nationalâsecurity threat and authorizes preemptive use of force worldwide, including in states âunable or unwillingâ to actâforeshadowing later drone justifications. Yet internal resistance from Secretary of Defense Weinberger, the Joint Chiefs, and a riskâaverse NSC yields disjointed operations rather than a coherent strategy. Fuller shows that Reaganâs administration lays the legal and rhetorical foundations for later targeted killing even as practical implementation falters. He argues that this period inaugurates the longâterm framing of terrorism as a quasiâwar problem, making airpower and covert force thinkable as routine tools.
Key Points:
-
Reaganâs rhetoric (âwar on terrorismâ) far outpaces his administrationâs actual willingness to use force.
-
NSDD 138 authorizes preemptive lethal force worldwide and advances an âunable or unwillingâ doctrine.
-
Hardliners (Shultz, Casey, North) push a warâparadigm; Weinberger and JCS emphasize prudence and conventional missions.
-
Internal dysfunction and ad hocism prevent coherent execution of preemptive policy.
-
Early debates over assassination, selfâdefense, and IHL anticipate later drone legal arguments.
-
The CIA is âunleashedâ rhetorically but still constrained by law and interagency politics.Â
CrossâCutting Themes:
-
Limits on airpower: DoD reluctance to assume CT mission; legal ban on assassination; fear of escalation with state sponsors.
-
Expectations vs. reality: Promised decisive retaliation devolves into episodic, often symbolic, actions.
-
Learning: NSDD 138 codifies concepts (preemption, global reach) that later underpin drone doctrine.
Limits Map (mini):
-
Political (endogenous): Interagency divisionsâWeinberger vs. Shultz/Caseyâmake consistent use of force difficult; partially adjustable via presidential leadership but never fully resolved.
-
Legal/Normative (exogenous/endogenous): EO 12333 and assassination norms constrain CT strikes; legal workâarounds (selfâdefense, âterrorists as unlawful combatantsâ) emerge but remain controversial.
-
Operational: Limited ISR, basing, and precision munitions cap the feasibility of preemptive strikes in terrorist sanctuaries.
-
Intelligence/Information: Patchy HUMINT and SIGINT create high risk of misidentification, reinforcing DoD caution.
Chapter 2: âLetâs Find a Way to Go after Themâ: The Fadlallah Affair and the Achille Lauro Hijacking, 1985
Summary:
Fuller uses two 1985 crisesâthe failed carâbomb assassination attempt against Lebanese cleric Muhammad Husayn Fadlallah and the Achille Lauro hijackingâto show how early CT practice shaped later preferences for drones. In the Fadlallah affair, CIAâlinked Lebanese proxies allegedly plant a massive car bomb near his Beirut residence, killing around eighty civilians while failing to kill the target. The operation prompts public outrage, questions about CIA involvement, and internal soulâsearching about the risks of outsourcing lethal CT to unreliable local agents. In the Achille Lauro case, U.S. forces force down an Egyptian airliner carrying hijackers, only to face a jurisdictional clash with Italy over custody and trialârevealing alliance friction and divergent legal frameworks (terrorists as criminals vs. enemy combatants). Fuller argues these episodes taught U.S. officials that proxies and extraterritorial snatches carry high political and legal risk, making them search for tools that are both more precise and more controllable. These lessons later increase the appeal of U.S.-controlled, precise, deniable airpower like UAVs.
Key Points:
-
Fadlallah car bombing demonstrates the danger of proxy operations: mass civilian casualties, target survival, and deniable yet politically costly U.S. involvement.
-
Achille Lauro exposes alliance tensions, competing legal regimes, and the limits of unilateral CT action in cooperative environments.
-
Both cases reveal a mismatch between hardline CT aspirations and available tools.
-
CIA learns to distrust proxies for lethal targeting and to value precise, U.S.-controlled means.
-
Legal disputes over jurisdiction and custody foreshadow later debates on renditions and targeted killing.
CrossâCutting Themes:
-
Adversary adaptation & sanctuary: Terrorists exploit complex legal and political environments (Lebanonâs chaos; maritime/thirdâcountry travel).
-
Limits on airpower: Absence of precise, lowâvisibility tools pushes reliance on messy alternatives.
-
Learning: Hard lessons from proxy and alliance blowback push later preference for drones and more controllable CT instruments.
Limits Map (mini):
-
Legal/Normative (exogenous): International law on sovereignty and due process constrains stateâsponsored assassination and forced renditions; only partially adjustable.
-
Political (exogenous/endogenous): Italian and Lebanese domestic politics limit U.S. freedom of action; blowback from Fadlallah affair discourages overt proxy terror.
-
Operational: Limited capability for longârange, precise strikes and weak control over proxies produce high collateral damage and strategic embarrassment.
-
Intelligence: Reliance on local informants with dubious motives contributes to misâtargeting and incorrect threat assessments.
Chapter 3: âWe Have to Find a Better Way to Send a Messageâ: The CIAâs Counterterrorism Center, from the Eagle Program to the Predator Drone, 1986â2001
Summary:
This chapter traces the creation and evolution of the CIAâs Counterterrorism Center (CTC) and its pursuit of unmanned platforms from the 1980s Eagle Program to the Predator by 2001. Under Duane âDeweyâ Clarridge, CTC becomes a hub for proactive CT operations, including an early âRadio Shack solutionâ conceptâa small, remotely piloted vehicle potentially capable of delivering ordnance. Fuller details how Clarridgeâs aggressive approach culminates in IranâContra, prompting backlash and feeding the covert action pendulum. Parallel to this institutional story runs a technological one: DARPAâfunded Amber, General Atomicsâ GNAT, and USAFâs troubled Aquila program gradually mature UAV capability. The CIA experiments with GNAT over the Balkans (Operation Lofty View), forging ties with Big Safari and demonstrating the operational utility of persistent ISR. By the late 1990s, Predator provides realâtime video of Osama bin Laden in Afghanistan but remains unarmed due to unresolved legal and organizational issues about whether the CIA can employ lethal force via UAVs. Only after 9/11âfollowing a stalled September 4, 2001 Principals Committee discussionâdoes the Bush administration authorize armed Predators under a sweeping covert action finding. Fuller stresses that the technical ability to arm drones preceded the political willingness to use them lethally.
Key Points:
-
CTC is set up to centralize CT operations and intelligence, with an early interest in unmanned strike options (Eagle Program).
-
The IranâContra scandal triggers oversight and mistrust, slowing CIA paramilitary initiatives.
-
Amber/GNAT demonstrate longâendurance ISR; Aquilaâs failure pushes DoD to reconsider UAVs.
-
Predator enables nearâcontinuous surveillance of bin Laden preâ9/11 but remains unarmed, revealing the primacy of legal/political limits over technological ones.
-
Armed Predator tests in early 2001 show feasibility; unresolved questions about assassination and CIAâs role delay operational use.
-
Postâ9/11 findings dramatically expand CIA lethal authorities, bringing the preâexisting âsee it/shoot itâ aspiration within reach.
CrossâCutting Themes:
-
Technological vs. political limits: Technology matures faster than legal and organizational willingness to employ it.
-
Institutional learning: CTC builds networks of analysts, tech specialists, and foreign informants central to later drone campaign.
-
Domain interplay: Integration of ISR (UAV feeds, satellites, HUMINT) with precision strike capacity is foundational.
Limits Map (mini):
-
Technological (endogenous): Early UAVs suffer from reliability, bandwidth, and endurance issues; gradually addressed through R&D and Big Safariâs rapid acquisition methods.
-
Legal/Normative (endogenous): CIA lawyers debate whether using armed UAVs constitutes assassination; the issue remains unresolved until postâ9/11 reâinterpretations.
-
Operational: Coordination between CIA and USAF over basing, C2, and airspace management; multiâagency friction over who âownsâ UAV capability.
-
Political: IranâContra hangover reduces presidential and congressional tolerance for bold covert action, delaying more aggressive UAV use.
Chapter 4: âTalking about Capturing bin Ladenâ: The Clinton Administration and the Legal Architecture of Lethal Force in Counterterrorism, 1993â2000
Summary:
Fuller challenges the narrative that the Clinton administration was âsoftâ on terrorism, showing instead that it built much of the legal architecture later used for lethal drones while remaining cautious about risk and collateral damage. PDD 39 and later directives place terrorism at the top of nationalâsecurity concerns, authorize renditions, and endorse limited uses of force. Clinton repeatedly authorizes cruise missile strikes (e.g., against alâQaeda after the 1998 embassy bombings) but is constrained by intelligence uncertainty, fears of civilian casualties, and sensitivity to political optics (âwag the dogâ). Meanwhile, CIA lawyers and NSC officials reinterpret EO 12333 and international law to distinguish âassassinationâ from lawful selfâdefense against terrorists engaged in ongoing armed attacks. Findings concerning bin Laden articulate âcapture if feasible, kill if necessary,â a formulation later mirrored in Obamaâera drone policy. Fuller situates these debates within a broader spectrum of U.S. grandâstrategy schools (assertive nationalists vs. liberal internationalists), showing how different camps weighed law, risk, and morality. The chapter ends with the picture of a legal framework ready to support targeted killing, even if cruise missiles and proxies remain the primary tools for action.
Key Points:
-
Clinton elevates CT but prefers cruise missiles and proxies, wary of casualties and legality.
-
Legal advisers craft interpretations of selfâdefense and âongoing armed conflictâ that allow lethal targeting of terrorists without violating assassination bans.
-
âCapture/killâ language and CT findings anticipate later drone strike authorizations.
-
Clintonâs caution leads to several missed opportunities against bin Laden, highlighting operational and intelligence limits.
-
The âcovert action pendulumâ still swings toward restraint due to IranâContra and broader distrust of CIA paramilitary action.
CrossâCutting Themes:
-
Legal/Normative limits: Law is not just a constraint but an enabling framework; once reinterpreted, it legitimates future drone strikes.
-
Efficacy: Cruise missiles and proxies are blunt instruments with limited flexibility against mobile, dispersed targets.
-
Learning: The Clinton years codify legal doctrines that later allow CIA to use drones in nonâbattlefield settings.
Limits Map (mini):
-
Legal/Normative (endogenous): Assassination bans, IHL, and UN Charter Article 51 require careful reâinterpretation; adjustable but slowly and politically costly.
-
Operational: Cruise missile flight times, launch constraints, and target movement limit the ability to exploit fleeting intelligence.
-
Intelligence: Coarse targeting data and dependence on proxies make bin Laden âcapture/killâ operations exceedingly risky.
-
Political: Domestic scandal (Lewinsky) and fear of âwag the dogâ accusations shape willingness to use force.
Chapter 5: âNinja Guys in Black Suitsâ: Alternative Counterterrorism Tools, 1993â2008
Summary:
Before drones become central, the U.S. relies heavily on alternative CT tools: renditions, black sites (GREYSTONE), JSOC raids, and expanded NSA surveillance. Fuller shows how these methodsâwhile sometimes effectiveâcarry severe legal, moral, and political costs that eventually render them politically toxic. The romanticized idea of âninja guys in black suitsâ conducting clean snatch operations repeatedly collides with messy reality: jurisdictional disputes, intelligence failures, and the problem of indefinite detention. The postâ9/11 Bush years see an expansion of JSOC and CIA paramilitary activities, including controversial detention and interrogation practices, which generate intense domestic and international backlash. As Obama enters office, he confronts a CT toolkit dominated by rendition and detention practices he has pledged to roll back, yet still faces pressure to neutralize terrorists overseas. Fuller argues that drones appear attractive partly because they promise to neutralize threats without new detainees or large troop deploymentsâmaking them a politically âcleanerâ successor to earlier tools.
Key Points:
-
Rendition and black sites provide a nonâairpower CT tool but become politically and legally unsustainable.
-
JSOC raids and special operations remain risky, resourceâintensive, and often dependent on hostânation cooperation.
-
NSA surveillance underpins both raids and drone strikes, but raises its own civilâliberties controversies.
-
Obamaâs desire to close GuantĂĄnamo and curb torture creates a CT âgapâ that drones help fill.
-
Drones become âthe only game in townâ partly because other CT options have been delegitimized or constrained.
CrossâCutting Themes:
-
Limits on airpower: Earlier groundâcentric CT tools set the political context that makes airpower (drones) preferable.
-
Adaptation: CIA and JSOC adapt from capture/detain to killâfocused CT as legal and political space for detention shrinks.
-
Efficacy: Drones promise fewer U.S. casualties and no detainees, but shift the burden to questions of civilian harm and sovereignty.
Limits Map (mini):
-
Legal/Normative (exogenous/endogenous): Torture, indefinite detention, and renditions provoke legal challenges and norm backlash; over time, these practices become politically untenable.
-
Political: Domestic and allied outrage narrows the menu of CT instruments available to presidents.
-
Operational: Hostânation basing, complex raids, and detainee handling limit number and scope of JSOC operations.
-
Resource/Time: Sustaining a global detention and interrogation architecture is expensive and politically draining, driving interest in âlighterâ tools like drones.
Chapter 6: âThe Only Game in Townâ: The Strategy and Effectiveness of the CIAâs Lethal Drone Campaign, 2009â2012
Summary:
Fuller evaluates the strategy and effectiveness of the CIAâs drone campaign in AfPak under Obama, organizing his analysis around three main objectives: (1) decapitation of alâQaedaâs leadership, (2) denial of safe haven, and (3) force protection for ISAF forces. Drawing on the literature on leadership decapitation (Pape, Jordan, Price, Johnston), he notes scholarly skepticism but emphasizes that empirical work suggests decapitation can increase the odds of government success by roughly 25â30 percent when integrated into broader strategies. Fuller finds that drone strikesâkilling around sixtyâfive senior leaders and between 1,853 and 3,032 militants from 2004â2016âhave âdecimated alâQaedaâs core leadership in South Asia,â a judgment echoed by U.S. officials and alâQaedaâs own laments. Persistent drone presence also psychologically and physically constrains alâQaeda, suffocating its ability to move, meet, and recruit. Mapping of strikes by the Bureau of Investigative Journalism shows that entire zones became effectively offâlimits, supporting a safeâhaven denial strategy and aiding ISAF operations in Afghanistan by targeting Taliban networks beyond the reach of ground troops. Fuller then examines blowback arguments and civilian harm, noting divergent assessments: critics claim social fabric destruction, while local activists and the 2012 Peshawar Declaration sometimes endorse drone strikes as the most acceptable counterâmilitancy tool. He concludes that, judged against Obamaâs narrow operational objectives in AfPak, the campaign was a tactical and operational successâbut its contribution to ending the broader âWar on Terrorâ is doubtful as jihadist violence diffused elsewhere.
Key Points:
-
Objective 1: Leadership decapitationâsubstantial attrition of alâQaeda core; supported by official and jihadist sources.
-
Objective 2: Denial of safe havenâstrike patterns and militant behavior suggest key FATA areas became noâgo zones for alâQaeda and Taliban.
-
Objective 3: Force protectionâdrones support NATO by hitting militants in Pakistani sanctuaries that ISAF soldiers cannot reach.
-
Civilian casualties decline over time as experience, safeguards, and refined targeting methods improve accuracy; Obama tightens rules compared to Bushâs signatureâstrike practices.Â
-
Local attitudes are mixed; some see drones as threats to social cohesion, others see them as preferable to Pakistani military operations or Taliban rule.
-
Despite successes in AfPak, global jihadist violence increases, driven by events beyond CTCâs remit (Arab Spring, Syrian civil war, IS rise).
CrossâCutting Themes:
-
Efficacy: Strong tactical/operational payoffs (HVT attrition, safeâhaven denial, force protection); unclear or negative strategic outcome regarding overall jihadist movement.
-
Limits on airpower: Drones cannot build governance, fix Pakistani politics, or address root causes of radicalization.
-
Adaptation & learning: CIA refines targeting, reduces civilian casualties, and builds a sophisticated intelligenceâstrike apparatus; jihadists adapt by dispersing, concealing, and shifting theaters.
Limits Map (mini):
-
Political (exogenous/endogenous): Pakistani sovereignty concerns, domestic antiâU.S. sentiment, and U.S. casualty sensitivity shape campaign tempo and secrecy.
-
Legal/Normative: Tension between Title 50 (covert CIA operations) and expectations of transparency/oversight for the use of force; partially relieved through public speeches (Brennan, Holder) and later policy guidelines.
-
Operational: Basing and overflight (e.g., Pakistani cooperation), weather, and ISR bandwidth constrain persistent presence.
-
Intelligence/Information: Targeting relies on network of local agents (pathrai beacons) and patternâofâlife analysis, susceptible to error and manipulation.
-
Adversary Adaptation: Jihadist communications discipline, movement from FATA to other theaters, and organizational diffusion limit what decapitation can achieve.
Conclusion: âIt Sends Its Bloodhounds Everywhereâ
Summary:
The conclusion situates the CIAâs drone campaign within a broader historical arc of empires extending coercive power across borders and anticipates a future of widespread drone proliferation. Fuller argues that U.S. drones have effectively functioned as âbloodhoundsâ hunting threats in spaces otherwise inaccessible to American forces, embodying the longâsought âweapon that would allow [the U.S.] to strike at targets in places it could not otherwise reach.â At the same time, he warns that technological diffusion is eroding the U.S. monopoly: states like China and Russia, and nonstate actors, are already integrating drones into hybrid warfare and terror campaigns. He documents early incidentsâactivists crashing a drone near Angela Merkel, unauthorized flights over French nuclear plants, and a wayward quadcopter landing on the White House lawnâas harbingers of broader security challenges. Fuller revisits his core thesis: since NSDD 138, successive presidents have sought to neutralize terrorist threats through preemptive force; drones are simply the most refined tool for that longâstanding strategy, not evidence of a fundamentally new policy. He ends by noting that drones, like nuclear technology and the Internet, will have dual usesâcapable of both violence and beneficial civilian applicationsâand that the key challenge will be how states regulate and adapt to their ubiquity.
Key Points:
-
Drones realize a decadesâold U.S. quest for longârange, precise, lowârisk coercive tools.
-
The CIA drone campaign in AfPak is a continuity of Reaganâera CT thinking, not a rupture.
-
Technological diffusion makes it inevitable that rivals and nonstate actors will use drones, including in hybrid warfare.Â
-
Drones will increasingly feature in domestic security debates and civilian life, complicating regulation and defense.
-
Tactical success against alâQaeda core coexists with an expanding, geographically diffuse jihadist threat.Â
CrossâCutting Themes:
-
Domain interplay: Airpowerâs evolution into common, lowâcost robotics blurs lines between military and civilian, domestic and foreign.
-
Limits & proliferation: U.S. efforts to control dronesâ use will be constrained by global diffusion and imitation.
-
Strategic ambiguity: Success in one theater may coexist with strategic drift in global CT posture.
Limits Map (mini):
-
Technological (exogenous): Drone proliferation reduces U.S. relative advantage and introduces new vulnerability (U.S. forces and homeland).
-
Legal/Normative: Lack of robust international norms on drone use risks escalation and normalization of crossâborder targeted killing.
-
Strategic: To wage war on âterrorâ as an abstraction is arguably unachievable; drones cannot solve a strategyâdefinition problem.
đ§ą Limits Typology (caseâspecific)
Political Limits
-
Domestic casualty sensitivity & warâweariness: Obamaâs âAfPak surgeâ pairs ground forces with drones to minimize U.S. casualties, maintaining public support longer than in Vietnam.
-
Origin: Exogenous (public opinion), endogenous (elite expectations).
-
Adjustability: Partially relaxable via narrative framing, but structurally persistent.
-
Effect: Encourages shift from raids and large deployments toward remote airpower.
-
-
Hostânation politics (Pakistan): Islamabad publicly denounces strikes while privately enabling them; domestic antiâAmericanism and sovereignty narratives constrain strike profiles.
-
Origin: Exogenous (Pakistani domestic politics, civilâmilitary dynamics).
-
Effect: Drives secrecy; shapes basing access and geographic scope of strikes.
-
Legal/Normative Limits
-
Assassination ban (EO 11905, 12333): Initially blocks overt targeted killing; lawyers reinterpret CT strikes as selfâdefense within ongoing armed conflict, not assassination.
-
Origin: Endogenous; response to Church Committee and earlier CIA abuses.
-
Adjustability: Relaxable through reinterpretation and presidential findings; politically costly.
-
-
International law (Article 51, IHL): Requires justifying strikes in nonâbattlefield states as collective or unilateral selfâdefense; shapes arguments about âunable or unwillingâ states.
- Effect level: Strategic; constrains where and how airpower is used for CT.
Strategic Limits
-
War on an abstraction: Targeting âterrorâ or âextremismâ lacks clear end state; decapitation and safeâhaven denial produce localized gains but not war termination.
-
Origin: Endogenous conceptual choice by U.S. leaders.
-
Adjustability: Requires reframing CT from âwarâ to finite political objectivesâlargely unrealized in the period Fuller covers.
-
Operational Limits
-
Basing and access: Drone operations depend on airfields (e.g., Pakistani sites) and overflight rights; closures or political crises can abruptly curtail capacity.
-
ISR & C2 bandwidth: Reliance on Kuâband satellite links and limited orbits creates coverage gaps and latency issues, constraining the âpersistent presenceâ ideal.
-
Joint integration: CIA Title 50 operations run parallel to JSOC Title 10 activities, complicating unity of command and comprehensive campaign design.
Technological/Capability Limits
-
Early UAV reliability & payload: Amber, GNAT, and early Predator models suffer reliability issues and limited payloads; only later do they become true hunterâkillers.
-
Precision vs. blast: Hellfire missiles, especially thermobaric variants, are precise in aim but still generate lethal blast zones for nearby civilians.Â
Intelligence/Information Limits
-
Reliance on HUMINT & pathrai beacons: Local agents and beacons can misdirect strikes; analysts face âfog of peopleâ problems in FATA.
-
Data overload & organizational focus: Emphasis on CT and drone operations detracts from broader strategic warning (Arab Spring, Crimea, IS rise).
Adversary Adaptation Limits
-
Tactical adaptation: Terrorists disperse, reduce signatures, and avoid electronic communications; they shift safe havens to regions beyond drone reach.
-
Organizational adaptation: Shift from hierarchical âalâQaeda coreâ to diffuse franchises and ISâlike protoâstates undermines decapitationâs strategic leverage.
Resource/Time Limits
-
Sustaining orbits & campaigns: Drone campaigns are cheaper than large wars but still resourceâintensive; longâterm focus on AfPak strains CIAâs global analytic bandwidth.
-
Political patience: Even lowâcasualty, lowâvisibility campaigns must show progress; this pressures metrics (HVTs killed) that may not map to strategic success.
đ Measures of Effectiveness (MoE)
What they tracked then:
-
Quantitative: Number of HVTs killed (e.g., ~65 senior leaders), total militants killed (1,853â3,032), number and frequency of strikes, geographic contraction of safe havens (measured by strike maps).
-
Operational: Disruption of attacks plotted from FATA, attack rates against ISAF, territorial control trends in Afghanistan.
-
Legal/political: Compliance narratives (briefings, collateral damage statements), success in avoiding large, public scandals, and maintaining Pakistani cooperation.
Better MoE today (with rationale):
-
Network resilience: Time for groups to regenerate leadership, depth of midâlevel cadre, and coherence of operational cells (socialânetwork analysis rather than kill counts).
-
Threat output: Rate and severity of successful/foiled plots against U.S. and allies originating from specific sanctuariesâties tactical strikes to meaningful security outcomes.
-
Local governance & legitimacy: Attitudinal measures in FATA/Afghanistan about local support for militants vs. state; whether strikes enable or undermine state authority.
-
Strategic diffusion: Changes in global jihadist territorial control and attack rates (per RAND/State data), correlated with drone activity and other interventions.
-
Alliance cohesion: Pakistani cooperation, NATO perceptions, and UN/ally reactions to targeted killing norms.
Evidence summary:
Fullerâs evidence suggests that on the narrow MoE used by U.S. officialsâHVTs removed, safe havens constrained, ISAF casualties moderatedâthe drone campaign performed well. However, when measured against broader strategic outcomesâending the âWar on Terror,â reducing global jihadist violence, stabilizing key regionsâthe results are inconclusive or negative, with jihadist violence expanding in theaters beyond AfPak.
đ¤ˇââď¸ Actors & Perspectives
Ronald Reagan & Counterterrorism Hardliners (Shultz, Casey, North)
-
Role / position: U.S. president and key advisors advocating a proactive, militarized CT strategy in the 1980s.
-
Key perspectives / assumptions: Terrorism is an existential nationalâsecurity threat; failure to respond decisively invites further attacks; U.S. must be willing to preempt and retaliate globally.
-
Evolution of stance: Move from rhetorical toughness to NSDD 138âs preemptive framework; implementation falters due to interagency resistance and scandals (IranâContra).
-
Influence on outcomes: Establish foundational legal and rhetorical justification for preemptive lethal CTâlogic later used for drones and targeted killing.
Caspar Weinberger & Joint Chiefs
-
Role / position: Secretary of Defense and uniformed leadership opposing expansive CT missions for DoD.
-
Key perspectives / assumptions: CT is primarily an intelligence/lawâenforcement problem; U.S. military should avoid small, risky operations with unclear exit strategies; use of force must meet strict tests (Weinberger Doctrine).
-
Evolution of stance: Remain skeptical of CT operations throughout Reagan era; postâ9/11, some resistance erodes but concerns about âmission creepâ persist.
-
Influence on outcomes: Push CT into CIAâs lane; limit early use of airpower and special operations for CT, indirectly making CIA drones more attractive later.
Duane âDeweyâ Clarridge & CTC
-
Role / position: Early head of CTC, champion of proactive, covert CT operations and early UAV concepts (Eagle Program).
-
Key perspectives / assumptions: Terrorists must be hunted aggressively with flexible tools; covert action should be agile and unconstrained by excessive legalism.
-
Evolution of stance: IranâContra discredits his methods, but his vision of unmanned âRadio Shackâ solutions foreshadows later drones.
-
Influence on outcomes: Institutionalizes CTC; seeds the idea that unmanned systems could provide a âsee it/shoot itâ capability, influencing later CIAâBig Safari collaboration.
Bill Clinton & Advisors (Reno, Berger, Clarke)
-
Role / position: President and senior officials steering CT in the 1990s.
-
Key perspectives / assumptions: Terrorism is a serious threat but must be tackled within legal and political constraints; prefer capture over kill; wary of civilian casualties and legal fallout.
-
Evolution of stance: Move from limited responses to more aggressive but legally rationalized measures (cruise missiles, CT findings targeting bin Laden).
-
Influence on outcomes: Build the legal scaffolding for targeted killing and selfâdefense arguments later invoked for drones.
George W. Bush, Dick Cheney & Postâ9/11 NSC
-
Role / position: President, vice president, and senior leadership after 9/11.
-
Key perspectives / assumptions: 9/11 proves the need for immediate, global, offensive CT, unconstrained by preâexisting rules; âtake the gloves offâ mentality.
-
Evolution of stance: Initially rely on large ground interventions and expansive detention/interrogation; later integrate CIA drones as key CT instrument.
-
Influence on outcomes: Authorize armed Predators and broad findings that normalize lethal force by CIA; create political and normative backlash that later shapes Obamaâs CT choices.
Barack Obama & John Brennan
-
Role / position: President and chief CT advisor overseeing the drone surge.
-
Key perspectives / assumptions: Drones offer a precise, lowârisk tool compatible with winding down large wars and closing GuantĂĄnamo; must be legally justified and seen as discriminating.
-
Evolution of stance: From embracing drones as âthe only game in townâ for AfPak, to gradual attempts at greater transparency and shifting CT burden back toward DoD.
-
Influence on outcomes: Institutionalize highâtempo drone campaign with formalized targeting processes (kill lists, PPG); shape norms for other leaders and allies.
CIA CTC & Directorate of Intelligence
-
Role / position: Core operators and analysts running the drone campaign and producing strategic assessments.
-
Key perspectives / assumptions: Decapitation, safeâhaven denial, and force protection can collectively reduce terrorist threats; drones are highly effective tools when integrated with broader counterinsurgency.
-
Evolution of stance: Initially CT analysts within broader CIA; over time, paramilitary mission grows, raising concerns that CIA is overâmilitarized at expense of global analysis.
-
Influence on outcomes: Drive adoption and refinement of drones; produce key documents (e.g., 2009 HVT âbest practicesâ report) that justify targeting as central COIN tool.
Pakistani Government & ISI
-
Role / position: Hostânation government and intelligence service whose cooperation is necessary for basing, overflight, and onâtheâground intelligence.
-
Key perspectives / assumptions: Seek strategic depth vs. India and influence in Afghanistan; balance domestic antiâdrone sentiment with need for U.S. support and pressure on certain militants.
-
Evolution of stance: Oscillate between tacit cooperation and public denunciation; use drone controversy to deflect blame for domestic security failures.
-
Influence on outcomes: Shape where, when, and whom CIA can target; complicate U.S. messaging and legitimacy.
AlâQaeda Leadership (bin Laden, Zawahiri, alâYazid)
-
Role / position: Adversary leadership whose actions and adaptations define CT challenge.
-
Key perspectives / assumptions: Need safe haven, vanguard, and symbolic attacks on U.S.; view drones as both lethal threat and propaganda tool.
-
Evolution of stance: From centralized, campâbased organization in Afghanistan to dispersed, franchised movement after 2001; later overshadowed by IS.
-
Influence on outcomes: Their survivability and adaptation test limits of decapitation; their communications acknowledge drone effectiveness, indirectly validating CIA assessments.
đ° Timeline of Major Events
-
1984â04â03 â NSDD 138 signed â Reagan formally designates terrorism a nationalâsecurity threat and authorizes preemptive use of lethal force worldwide, creating the policy template later used for drones. (inflection point: legal foundation)
-
1985â03 â Fadlallah carâbomb attempt â Proxy operation in Beirut kills ~80 civilians but misses the target, underscoring the risks of outsourced lethal CT and shaping future distrust of proxies.
-
1985â10 â Achille Lauro hijacking â U.S. interception of hijackersâ plane leads to a legal clash with Italy over custody, highlighting alliance and jurisdictional limits on CT operations.Â
-
Midâ1980s â Creation of CIA Counterterrorism Center (CTC) â Clarridge establishes CTC, initiating dedicated bureaucratic structures for CT and exploring the Eagle Program concept for UAVâstyle targeting.
-
1998â08 â Cruise missile strikes on Afghanistan and Sudan (âOperation Infinite Reachâ) â Clinton uses cruise missiles against alâQaeda, exposing limitations (warning, collateral, target mobility) that later enhance dronesâ appeal.
-
2000 â Predator surveillance of bin Laden in Afghanistan â UAV feeds capture likely footage of bin Laden, but unarmed status and legal caution prevent a strike, becoming a key âmissed opportunityâ narrative.
-
2001â02 â First armed Predator tests â MQâ1 successfully fires Hellfires, proving technical feasibility; legal and organizational hesitations still delay combat use.
-
2001â09â17 â Broad covert action finding â Postâ9/11, Bush authorizes CIA to conduct lethal operations against alâQaeda globally, unlocking the armed Predator as an operational tool. (inflection point: CIA lethal authority)
-
2009â03â11 â Obamaâs Afghanistan surge & drone intensification â Obama doubles down in AfPak, using drones as a cornerstone of CT and COIN strategy while promising eventual troop withdrawal. (inflection point: drone surge)
-
2010â05â21 â Boyya strike killing Mustafa Abu alâYazid â Highâvalue kill with significant civilian casualties becomes emblematic of the promise and controversy of CIA drones.
-
2012â09 â Stanford/NYU âLiving Under Dronesâ report â Influential civilâsociety report challenges U.S. claims about low civilian casualties and minimal blowback, intensifying legal and normative debates about drones.
đ Historiographical Context
Fuller intervenes in a literature dominated by legal arguments, normative critiques, and journalistic exposĂŠs rather than deep historical analysis. He engages critics like Philip Alston, Mary Ellen OâConnell, Hina Shamsi, and the Stanford/NYU âLiving Under Dronesâ report, who question legality, transparency, and civilian protection in the drone campaign. He also dialogues with scholars skeptical of decapitation strategies (Robert Pape, Jenna Jordan, Mia Bloom) and those more supportive (Bryan Price, Patrick Johnston), situating drones within broader debates about how terrorist groups end. Fuller builds on historical works on CIA covert action (Woodward, Persico, Weiner) and on Reaganâera CT (Naftali, Riedel), but diverges by explicitly linking these histories to the drone program rather than treating drones as primarily a BushâObama phenomenon. His âcovert action pendulumâ concept synthesizes insights from the Church Committee era, IranâContra, and postâ9/11 controversies into a single interpretive frame. Against accounts that depict drones as a qualitatively new paradigm (e.g., Andrew Cockburn, some justâwar critics), Fuller stresses continuity and incremental evolution.
đ§Š Frameworks & Methods
-
Levels of Analysis:
-
Strategic: U.S. grand strategy toward terrorism (war vs. law enforcement; preemption vs. deterrence).
-
Operational: CTCâs campaign designâdecapitation, safeâhaven denial, force protection.
-
Tactical: Individual strikes, targeting processes, and crew behavior (e.g., Boyya).
-
-
Core Frameworks:
-
Covert Action Pendulum: Cycles of overuse and backlash in CIA paramilitary activity (Church, IranâContra, postâ9/11) condition later risk tolerance and legal architecture.
-
See It/Shoot It Option: Richard Clarkeâs phrase, adopted by Fuller as central metaphorâdrones embody the longâsought capability to identify and immediately strike terrorists anywhere.Â
-
Decapitation & SafeâHaven Denial: CTC frames drones around leadership targeting and territorial denial, drawing on emerging COIN and terrorism studies.
-
-
Methods & Sources:
-
Declassified documents (EOs, NSDD/PDDs, MONs), congressional testimony, and leaked CIA assessments.
-
NGO and journalistic datasets (BIJ, NAF) for strike counts and casualty estimates.
-
Legal scholarship and UN reports for normative debates.
-
Terrorism and COIN literature for evaluating decapitation and safeâhaven logic.
-
-
Instruments of Power (Air/Space/UAS):
-
Drones function as an ISR/strike hybrid platform, integrating strategic attack (leadership), interdiction (lines of communication), and close support/force protection roles.
-
Space assets (GPS, SATCOM) and global basing are essential enablers, highlighting that UAS effectiveness is inseparable from broader aerospace infrastructure.
-
đ Learning Over Time (within the book & vs. prior SAASS 628 cases)
What shifted?
-
From proxies and symbolic raids (Fadlallah, Achille Lauro, Libya bombing) to persistent ISR and precision strike via UAVs.
-
From legal prohibition (assassination bans) to legalized targeted killing under selfâdefense frameworks.
-
From capture/detain focus (renditions, black sites) to killâfocused CT as detention became politically unsustainable.
-
From adâhoc CT operations to a routinized global drone campaign with formalized decision processes.
What persisted?
-
Desire for risk transferâminimizing U.S. casualties and political costs by pushing danger onto proxies, standoff weapons, and eventually machines.
-
Reliance on elite decisionâmaking with limited congressional oversight whenever paramilitary CIA tools are involved.
-
Difficulty translating tactical and operational successes into lasting strategic outcomes in complex political environments.
What was (mis)learned?
-
Learned: Highâvalue targeting works best when integrated into broader strategies; drones are potent at denying specific safe havens.
-
Mislearned: That decapitating alâQaeda core would be sufficient to end the jihadist threat; the movement adapted and diffused geographically.
Comparative to prior SAASS 628 cases:
-
Relative to classic strategic bombing campaigns (e.g., WWII, Kosovo), drones exemplify precision denial more than punishment or coercion: success is measured by disruptions and degraded networks rather than surrendered governments.
-
Compared to Papeâs denial vs. punishment framework, drones mostly conduct denial of safe haven and attrition of capabilities, not strategic coercion of a stateâhighlighting the challenge of applying airpower theory to nonstate adversaries.
đ§ Critical Reflections
-
Strengths:
-
Integrates legal, technological, and institutional histories, showing how CT airpower emerges from longâterm trends rather than sudden revolutions.
-
Offers a nuanced assessment of effectivenessâacknowledging significant operational successes while highlighting strategic limits and diffusion of jihadist violence.
-
Uses âcovert action pendulumâ and âsee it/shoot itâ as compelling frameworks that travel well to other CT cases.
-
-
Weaknesses / Blind Spots:
-
Heavy dependence on U.S. and Western sources; Pakistani and Afghan perspectives, while present, are filtered through secondary reporting.
-
Focus on AfPak core somewhat underplays the drone programâs interaction with Yemen, Somalia, and other theaters.
-
The assessment of blowback is cautious but perhaps leans toward U.S. official and quantitative metrics; deeper qualitative work on radicalization pathways might reach more pessimistic conclusions.
-
-
Unresolved Questions:
-
To what degree did CIAâs focus on drones materially impede its ability to foresee and interpret the Arab Spring and IS rise?
-
How sustainable is a CT model that relies heavily on covert lethal force in terms of international norms and longâterm alliances?
-
âď¸ Comparative Insights (link to prior course readings)
-
Vs. classic strategic bombing (e.g., Douhet, Warden, Pape): Drones invert much of the theoryârather than massed bomber fleets risking aircrew in decisive campaigns, we see continuous, lowâsignature attrition of individuals. Yet, like Papeâs denial strategy, Fullerâs account suggests airpower is most effective when it denies key physical and organizational âbasesâ to the enemy (safe haven, leadership sanctuaries).
-
Vs. Desert Storm/Kosovo cases: Whereas those campaigns targeted state centers of gravity to compel policy change, the CIAâs drone war targets nonstate actors whose political center of gravity lies in ideology and social networksâharder for airpower alone to break.
-
Vs. CT literature on decapitation (Jordan, Cronin, Price): Fuller aligns with more optimistic quantitative findings (Price/Johnston) regarding decapitationâs contribution to reduced violence but cautions that success is partial and contingent on broader political context.
âď¸ Key Terms / Acronyms
-
CTC â Counterterrorism Center (CIA hub for CT operations and drone campaign).
-
NSDD 138 â National Security Decision Directive framing terrorism as nationalâsecurity threat and authorizing preemptive force.
-
EO 12333 â Executive order governing U.S. intelligence, including assassination ban.
-
AUMF â Authorization for Use of Military Force (postâ9/11).
-
Title 10 vs. Title 50 â Statutory divide between military operations and covert intelligence activities.
-
HVT â HighâValue Target (senior militant/terrorist leader).
-
Decapitation Strategy â Targeting leadership to degrade group capability and cohesion.
-
Safe Haven Denial â Efforts to make geographic areas unusable for terrorist basing and training.
-
Signature vs. Personality Strikes â Targeting based on patterns of behavior vs. known identities.
-
Pathrai â Small GPS homing beacons used by CTC agents to mark targets for drones.Â
â Open Questions (for seminar)
-
What lessons informed the adoption of unmanned aircraft as a tool of counterterrorism policy?
-
Lessons from proxy failures (Fadlallah) taught that outsourced lethal CT was imprecise, deniable but politically costly, and hard to control.
-
Alliance/jurisdiction conflicts (Achille Lauro) showed that snatch operations in cooperative environments invite diplomatic crises.Â
-
Cruise missile limitations (flight time, warning, collateral) revealed that standoff fires were too blunt for mobile, networked terrorists.
-
Early UAV ISR successes (Lofty View, Predator over Afghanistan) demonstrated the value of persistent surveillance for CT, creating demand for an armed âsee it/shoot itâ option.
-
Political blowback from renditions and detention pushed future administrations toward tools that neutralized threats without expanding GuantĂĄnamo or black sitesâdrones filled this niche.
-
-
Which actors were most important in this adoption and why?
-
Reaganâera hardliners (Shultz, Casey, North) established the conceptual and legal foundation (NSDD 138, preemptive global force) that later made drone CT thinkable.
-
Clarridge & CTC institutionalized proactive CT and early UAV ideas, building the organizational infrastructure essential for later adoption.
-
Clinton administration lawyers and NSC staff (Reno, Berger, Clarke) crafted legal interpretations of assassination bans and selfâdefense, and articulated the âsee it/shoot itâ desire, so that when UAVs matured, a legal path already existed.
-
Bush administration & CIA leadership (Tenet, Black, Hayden) authorized and operationalized armed Predators under postâ9/11 findings.
-
Obama & Brennan elevated drones to the centerpiece of CT strategy, refined targeting rules, and normalized their use in U.S. policy.
-
-
What limits existed on airpower in a counterterrorism role?
-
Legal/Normative: Assassination bans, sovereignty rules, and IHL obligations forced drones into a selfâdefense framework and demanded (at least nominal) minimization of civilian casualties.
-
Political: Hostânation politics (Pakistan), alliance dynamics, and domestic casualty sensitivity constrained basing, target selection, and transparency.
-
Operational/Technological: Dependence on basing, SATCOM, and vulnerable ISR networks limited where drones could fly and how persistently.
-
Intelligence: Reliance on local informants and patternâofâlife analysis introduced uncertainty and potential for misâtargeting.
-
Strategic: Airpower could disrupt and deny but not create legitimate governance or address ideological drivers of jihadism.
-
-
How effective was American airpower in accomplishing counterterrorism objectives?
-
On narrow operational objectives (destroy alâQaeda core, deny AfPak safe haven, protect ISAF), Fuller concludes the CIA drone campaign was largely successful: leadership attrition, restricted movement, and support to NATO operations are wellâdocumented.
-
On broader strategic goals (ending the War on Terror, reducing global jihadist violence), effectiveness is limited: jihadism diffuses to new arenas (Syria, Iraq, North Africa) and extremist territorial control actually increases in the decade after drone warfare ramps up.
-
Fullerâs bottom line: drones are effective CT tools at tactical and operational levels but insufficient to produce decisive strategic outcomes on their own.
-
-
What does Fullerâs account tell us about the strengths and challenges of writing contemporary history?
-
Strengths: Access to newly declassified documents, NGO databases, and realâtime legal and policy debates allows Fuller to link archival material with current controversies in a way older histories cannot.
-
Challenges: Ongoing classification, incomplete data on casualties and targeting criteria, and evolving legal interpretations mean the story is necessarily partial; key documents and perspectives (especially nonâU.S.) remain obscured.
-
Fuller must triangulate between government statements, leaks, and investigative journalism, which can conflict, forcing cautious inferences.
-
As policies and drone technology continue to evolve, any snapshot risks becoming outdated, underscoring his theme that âtrue watersheds are seldom spottedâ in real time.Â
-
đ Notable Quotes & Thoughts
-
âUltimately, what this book demonstrates is that the CIAâs drone campaign in the AfPak region marks a return to, rather than a further departure from, counterterrorism methods and strategy developed in the decades preceding 9/11.â (p. 21) â Core thesis: continuity over rupture.Â
-
âThe legal architecture that authorized the hundreds of drone strikes that the Obama administration launched⌠[is] the product of two decades of persistent experimentation and evolution in Americaâs ongoing effort to neutralize the threat posed by burgeoning antiâAmerican terrorist groups.â (p. 63) â Highlights incremental, pathâdependent learning.Â
-
âThe leadershipâs deterioration has equally been the result of the droneâs original, but frequently overlooked, defining characteristicâits endurance.â (p. 224) â Reframes drones: persistence, not just precision, is central to their effect.Â
-
âIf the people of the warâaffected areas are satisfied with any counter militancy strategy, it is the Drone attacks which they support the most.â (Peshawar Declaration, quoted p. 239) â Challenges simple blowback narratives; local attitudes are complex.Â
-
âIf one is to measure success purely by examining the degree to which the campaign achieved the primary goals that were set out in Obamaâs orders, it would appear that the CTCâs drone war was a success⌠The real measure of success, howeverâwhether or not this has been enough to move the United States closer toward an end to the War on Terrorâremains unclear, but it looks unlikely.â (pp. 239â240) â The tactical/strategic gap in one paragraph.Â
-
âFor decades the United States sought a weapon that would allow it to strike at targets in places it could not otherwise reach. In drones it has this weaponâŚâ (p. 251) â Summarizes the longâterm technological quest that drones fulfill.Â
đ§ž FinalâPaper Hooks
-
Claim 1: The CIAâs drone campaign is best understood as the institutionalization of Reaganâera CT logic under new technological and legal conditions, not as a fundamentally new policy innovation.
-
Evidence/quotes/pages: NSDD 138 (Reagan), the âcovert action pendulumâ analysis (pp. ~130â135), and Fullerâs explicit âreturn rather than departureâ thesis (p. 21).
-
Counterarguments: Emphasize proliferation of Title 50 lethal operations and globalized kill lists as genuinely novel; respond that underlying logic (preemptive, global CT) is old even if tools evolved.
-
-
Claim 2: Drones are highly effective at achieving narrow CT objectives (decapitation, safeâhaven denial, force protection) but structurally unable to deliver decisive strategic outcomes against a diffuse jihadist movement.
-
Evidence: Quantitative leadership and militant kill estimates (p. 231), safeâhaven denial discussion (pp. 224â225), and mismatch with global jihadist growth (pp. 240â241).
-
Counterarguments: Some may claim that without drones, global jihadist violence would be worse; you can respond by emphasizing Fullerâs âpartial success, global diffusionâ framing.
-
-
Claim 3: The choice of drones under Obama reflects not only their tactical utility but also political and normative constraints arising from earlier CT practices (renditions, torture, large wars).
-
Evidence: Chapter 5âs account of renditions and black sites becoming âpolitically poisonousâ (pp. 178â191), Obamaâs rhetoric on Iraq and Afghanistan (pp. 231â232), and the need for a CT tool that creates no new detainees.
-
Counterarguments: Critics may see drones as evidence of moral backsliding; your argument can emphasize tradeâoffs: drones as âleast badâ option given political constraints, but still normatively fraught.
-
-
Claim 4: The diffusion of drone technology and doctrine poses new challenges to U.S. airpower dominance, as rivals and nonstate actors adopt their own âsee it/shoot itâ options.
-
Evidence: Conclusionâs discussion of global UAV proliferation and hybrid warfare (pp. 251â252).Â
-
Counterarguments: Some may argue U.S. still retains qualitative edge; you can stress Fullerâs cautionary historical analogy (machine guns, tanks, nukes) and the inevitability of diffusion.
-