• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • About
    • Editorial Staff
      • Bryan Strawser, Editor in Chief, Strife
      • Dr Anna B. Plunkett, Founder, Women in Writing
      • Strife Journal Editors
      • Strife Blog Editors
      • Strife Communications Team
      • Senior Editors
      • Series Editors
      • Copy Editors
      • Strife Writing Fellows
      • Commissioning Editors
      • War Studies @ 60 Project Team
      • Web Team
    • Publication Ethics
    • Open Access Statement
  • Archive
  • Series
  • Strife Journal
  • Contact us
  • Submit to Strife!

Strife

The Academic Blog of the Department of War Studies, King's College London

  • Announcements
  • Articles
  • Book Reviews
  • Call for Papers
  • Features
  • Interviews
You are here: Home / Archives for Afghanistan

Afghanistan

Book review: 'America’s Modern Wars: Understanding Iraq, Afghanistan and Vietnam' by Christopher Lawrence

May 23, 2016 by Cheng Lai Ki

Reviewed by: Cheng Lai Ki

k2-_be31b795-6731-4291-86f2-794a97352a03.v1

Christopher Lawrence. America’s Modern Wars: Understanding Iraq, Afghanistan and Vietnam. Oxford, UK. Casemate Publishers, 2015. ISBN: 978-1612002781. Hardcover. £19.99

Compared to other countries around the world, the United States military possesses the largest expenditure rate in the world of around $640,221million, according to a study conducted by the Brookings in 2014.[1] Within the last century, the United States has proven its military capabilities in multiple conflicts. The rise of advanced warfare tactics through technological developments (i.e. Unmanned Combat Vehicles) has allowed distancing from direct confrontation or engagement in hostiles. The increased distance from the battlefield and development of new combat tactics avoiding confrontation makes the determination of conflict victories increasingly elusive. Despite the existence of multiple detailed and comprehensive studies on insurgency and counterinsurgency, most are limited to specific cases or conflicts. Adding complexity to the phenomenon of insurgencies, the lack of detailed (and accurate) information ultimately inhibits the understanding and formation of effective counterinsurgency strategies.

In America’s Modern Wars: Understanding Iraq, Afghanistan and Vietnam, Christopher Lawrence offers a more systematic, quantitative approach towards the subject of insurgency and counterinsurgency. This was accomplished utilising resources obtained from his role at The Dupuy Institute (TDI), a non-profit organisation focused on academic research and studies around historical data associated to armed conflicts and acclaimed resolutions. TDI has collaborated in the past with the governmental agencies. Between 2002 – 2004, TDI produced three annual reports developed for the United States Department of the Army regarding the combat effectiveness within cities.[2] Through extremely comprehensive quantitative studies, the book critically examines the Iraq, Afghanistan, and Vietnam wars to determine the various elements and factors supporting the ultimate outcome of each conflict.

Studies and publication conducted by TDI revolve around the examination of historical resources. This academic and research discipline allows for evidentiary based analyses to be conducted. Ergo, Lawrence was able to conduct an extremely comprehensive strategic analysis and its outcomes of several conflicts where United States played a significant role. The book begins with TDI outlining their casualty estimate for the United States government agencies. Impressed by their statistical collection methodologies supporting their estimates, other agencies ultimately expanded their contracts with the institution for additional data collection and subsequent studies. Over the course of the Iraq War, Lawrence coordinated multiple projects involving quantitative researchers. TDI’s relationship with various department within the United States government has thus allowed its researchers access to the extensive material available from internal departments and centers (i.e. United States Army Center of Military History). As an individual, Lawrence has also published several papers and monographs for the Congressional Office of Technology Assessment and the Vietnam Veterans of American Foundation in addition to an amalgamation of assessments for the Department of Defense.[3] The book fundamentally centres upon quantitative variables of indigenous and intervening government typologies, insurgency motivations, insurgency structure, typology of counterinsurgency waged, rules of engagement and the nature of the conflict’s resolution.

Throughout the book, Lawrence identifies several correlations between variables that could be applied consistently throughout the three major wars in Iraq, Afghanistan and Vietnam. His analysis revealed a correlation between force ratios and insurgent motivations. Comparing his discoveries towards conventional counterinsurgency assessments and studies, Lawrence has quantifiably identified that although overwhelming force ratios (between counterinsurgents and insurgents) are not required for counterinsurgency success, it is larger fighting forces that ultimately yields counterinsurgency victory. Within the analysis, Lawrence also suggests several other variables that might influence the outcome of counterinsurgencies. However, it would appear from the text that limited statistical emphasis or research was placed into these considerations. Throughout the book, Lawrence develops several statistical models to describe and analyse the dynamics of the counterinsurgency campaigns that essentially defined the Iraq, Afghanistan and Vietnam wars. However, acclaimed to examine the three modern wars of the United States has devoted a considerable amount of focus on the Iraq and Afghan War in contrast to Vietnam. Any book of this scope often focuses on specific reader categories. Therefore, the following section briefly addresses overarching benefits and limitations of the book for two main categories of readers: Academics and Practitioners.

With multiple elements within warfare categorically quantified within the book, academics could find the level of depth significantly beneficial to their studies. This book is an invaluable resource that both analyses and summarizes – with statistical support – three counterinsurgencies fought by the United States. For example, in Iraq, Lawrence argues that the counterinsurgency by the United States (Coalition) and the Iraqi Government was a success due to the generation of an overwhelming force-ratio compared to the insurgents. Given the nature of academia, criticism/rebuttal against his assentation is a given, as some would question the true definition of successfulness of the United States during Iraq, given its current state-of-affairs.[4] Its limitations reside in its dense and hyper-focus upon statistical analysis; how the ‘numbers’ reflect reality could be (at times) difficult to understand and internalise – let alone contextualise against other theories within security studies.

Practitioners on the other hand might be initially overwhelmed by the sheer amount of quantitative/statistical data Lawrence goes into. However, it does not remove the quantitative benefits of the book for individuals within military domains. Providing an extremely comprehensive statistical analysis of the three counterinsurgencies, policy-makers would also benefit from this source of information. Fundamentally taking a historic approach, reflective analysis of the book can be a valuable resource for strategists to evaluate the effectiveness of American decisions during the wars. However, limitations of the book arguably depend heavily on the statistical knowledge (and interest) of the reader; especially when addressing practitioners. Regardless, to practitioners, the book is an invaluable resource to expand their horizon and understanding of United States activities during the three counterinsurgencies. The professional data collection and analytics compiled into this singular source makes America’s Modern Wars a valuable resource to understand (quantifiably) elements that can influence the outcome of counterinsurgencies.

Despite the sheer depth of statistical analysis into the elements within counterinsurgencies, Lawrence’s analysis places significant value on available (and accessible) information. America’s Modern Wars is unlikely to end any debates regarding the effectiveness of counterinsurgency strategies used in the three campaigns – as it may prove controversial should any such claim be made. It is commendable that Lawrence acknowledges the propensity for analyses to be revised in light of new data. The analysis does, however, provide an interesting perspective for practitioners and academics focusing on security issues associated to the activities of the United States. This source of analysis that utilises quantifiable information is a useful source – especially to practitioners drafting approval papers/plans. However, there remains a widespread belief that the complexity of warfare (and more importantly insurgencies) cannot be categorised or exclusively studied solely through quantifiable research. Regardless, Lawrence does manage to quantifiably identify one of the largest flaws of the United States strategies in the three conflicts, which is their inherent misunderstanding of counterinsurgency.[v] Nonetheless, America’s Modern Wars is still recommended for anyone aiming to obtain a comprehensive quantitative understanding of United States strategies in Iraq, Afghanistan and Vietnam.

Formerly with the Singapore Armed Forces, Cheng holds a Bachelor’s Honors degree in Criminology. During his military service, he was a senior tactical and operational instructor for the Armour Formation. He is currently reading for an MA in International Intelligence and Security at King’s where his academic specialties revolve around proxy strategies such as private military security companies, drones and cyber-warfare. In May 2016, he published an article on the vulnerabilities of transatlantic submarine cables in IHS Jane’s.

Notes:

[1] Dews, F. ‘Charts: U.S. Army size and defense expenditures relative to other nations’, Brookings [Online], (Oct 14 2015), Available from: http://www.brookings.edu/blogs/brookings-now/posts/2015/10/charts-us-army-size-defense-expenditures, (Accessed May 21 2016)

[2] ‘Publications’, The Dupuy Institute [Online], Available from: http://www.dupuyinstitute.org/tdipubs.htm, (Accessed May 21 2016)

[3] Lawrence, C.A. ‘President Obama’s Casualty Estimates’, Mystics & Statistics [Online], (Dec 27 2015); Available from: http://www.dupuyinstitute.org/blog/2015/12/27/president-obamas-casualty-estimates/ (Accessed Jan 2016)

[4] Cordesman, A.H., ‘American Strategic and Tactical Failures in Iraq: An Update’, Center for Strategic and International Studies Arleigh A. Burke Chair in Strategy [Online], (Aug 8 2006); Available from: http://csis.org/files/media/csis/pubs/060808_iraqfailures.pdf, (Accessed Dec 2015).

[5]Ubaldi, J. ‘Why Civil Military Operations will be a Combat Multiplier in Counterinsurgency Operations’, SmallWarsJournal.org [Online], (2009).

Filed Under: Book Review Tagged With: Afghanistan, Iraq, us, US Foreign Policy, Vietnam

The limits of US security cooperation in Jordan

April 22, 2016 by Peter Kirechu

By: Peter Kirechu

Barack_Obama_and_Abdullah_II
President Barack Obama Meets with King Abdullah II of Jordan in the Oval Office on 26 April, 2013. Source: Wikimedia.

The most notable feature of President Barack Obama’s partnership-based counterterrorism doctrine­–roughly defined–is its central focus on training and arming local security services to independently deal with emerging terrorism threats. The President’s doctrine is unfortunately fraught with inconsistent performance of US-trained security services, especially among fragile states in the Middle East and beyond. Whether in Iraq, Yemen, or Afghanistan, singular focus on capacity building within the security sector has failed to remedy the governance failures that fuel instability within the region.

In Jordan, the United States (US) enjoys a long history of sustained political, economic and military cooperation which dates back to 1951. However, since the self-styled Islamic State established a cross-border presence in Syria, concerns with the contagion of trained militants across Jordan’s borders have led to substantial increases in US security assistance. In February 2015, the United States expanded its annual aid to Jordan from $660 million to $1 billion. The funds were directed towards core counterterrorism priorities (border protection, C4ISR, quick-reaction airlift capabilities) and also the immediate humanitarian demands incurred by the Syrian refugee crisis.

Though the US-Jordanian security relationship is less fraught with discord when compared with other states in the region, this assessment slightly deceives a growing angst within the Jordanian public. Since the brutal loss of Jordanian pilot, Muath al-Kasaesbeh, to the Islamic State in 2014, the public is increasingly apprehensive of its government’s support of US policy prerogatives. The pilot’s death stood as a stark reminder of the costs paid by the Jordanian military–and the public writ large–in small part due to the government’s role within the US-led anti-Islamic State coalition.

Despite this fomenting anxiety, the United States appears squarely focused on the more proximate security threats borne by the Syrian conflict. But as the Salafi-Jihadist landscape evolves throughout the region, Jordan will remain an attractive target due to the available reservoir of disenchanted locals eager for a brighter economic future and resentful of the government’s stunted reforms. Unless the United States adopts a more balanced security assistance approach, one that emphasizes comprehensive governance reforms, the current policy will remain inadequate to the underlying causes of domestic instability.

Jihadist entreaties on a vulnerable public

Since 2013, Jordan has served as the training and staging ground for Syrian rebels battling the Islamic State in Southern Syria. This training effort has slowly expanded and now includes the provision of Anti-Tank Guided Missiles (ATGM) to various US-supported rebel factions. This covert effort proceeded under limited public scrutiny until the Islamic State’s capture and subsequent beheadings of several western journalists and aid workers. These gruesome executions ultimately triggered the US-led aerial bombing campaign against the jihadist group in both Iraq and Syria.

The Jordanian government joined the US effort, viewing its participation as a necessary measure aimed at shoring up Jordan’s national security. At the outset, the public’s response was initially quite supportive but subsequent research polls conducted by the Arab Center for Research and Studies revealed that a majority of respondents viewed the campaign as more beneficial to the United States, Israel and Iran, rather than to Jordan’s security and stability. Though Jordanians expressed early support for their government’s role within the coalition, many did not consider the country’s security interests under direct threat.

But once Lt. Muath al-Kasasbeh was captured and gruesomely executed, his death elevated formerly muted discontent with Jordan’s role within the coalition. Those who not normally involve themselves with the ebbs and flows of foreign affairs found themselves participants in a growing conversation on the merits of their government’s continued involvement in the US-led coalition.

Nonetheless, the participation of roughly 2,200 Jordanian citizens in active battlefronts in Syria and Iraq underscores the government’s concerns with the return of trained militants who may seek to undermine the current governing order. As such, the government’s participation in the US-led coalition appears to be a reasonable response to the rising threat of both domestic and foreign militancy.

On the domestic front, Jordanian authorities have banned cleric that are sympathetic to the Islamic State from delivering public sermons. Other measures include the release of some prominent Salafist clerics with the intent of enlisting their assistance in combatting jihadist rhetoric within the public domain. The government has also adopted a more repressive approach to public dissent, detaining Muslim Brotherhood members and introducing new amendments to the Anti-Terrorism Law. These changes have criminalized the criticism of foreign countries and their leaders while permitting the prosecution of journalists and activists for speech-related crimes–as widely interpreted by the State Security Court.

The crackdown on public speech under the cover of combatting terrorism weighed heavily on Jordan’s decline from a ‘Partially Free’ to a ‘Not Free’ State according to the Freedom’s House Freedom in the World rankings. This ranking has endured since 2010 and is not likely to improve under current conditions. Unfortunately, the government’s embrace of these policy prerogatives harms the state’s long-term security by ignoring legitimate public grievances and broadening public apathy with stagnated reforms that were once viewed as a bulwark against domestic instability.

Crises of Socio-Economic Patronage

The Hashemite Kingdom’s most urgent economic ails are grounded in the patronage and subsidy system which secures the monarchy’s rule. Regime loyalty underscores the long-running history of generous welfare benefits accorded to East Banker tribes and the pervasive use of personal friendships and tribal relationships to secure professional positions throughout the government. The patronage system is particularly acute within some sectors of the security services, where political and personal relationships often supersede professional conduct and competency.

The unprecedented nine to ten percent increase of the overall Jordanian population as a result of Syrian refugees has pushed the import-heavy Jordanian government into further reliance on foreign financial aid. Through IMF, EU, and US financial support, the country’s budget deficits have narrowed though public debt remains at 90 percent and unemployment increased from 14 percent to 22 percent in 2014. Due to the government’s overdependence on a politically motivated patronage system, systemic reforms are anathema to those who have historically thrived under public benefits. Thus efforts to curb this reliance ultimately undermine the Monarchy’s ability to institute meaningful economic changes. Nonetheless, progress towards this difficult objective remains a worthwhile goal for Jordan’s overall security.

The international community’s traditional responses to Jordan’s precarious economic position often focus on broadening the country’s financial reserves through infusions of foreign aid. But as long as foreign direct investments serve as the preferred model of external financial support, the government should channel these funds towards economic activities that utilize the immense labor reserves offered by the refugee population and Jordan’s unemployed youth.

By adopting economic policies that target this readily available labor pool, the government can provide opportunities for a highly vulnerable population in the low-skill manufacturing, agriculture, and construction sectors. Due to the widespread destruction of Syria’s manufacturing output, and the slow disappearance of formerly productive commercial centers and trade routes, the Jordanian government has the opportunity to develop these lost capabilities within its borders. Such an approach similarly coopts the potential diversion of marginalized youths and refugees into criminality or radicalization.

This approach not only addresses the socio-economic grievances that threaten the government’s long-term stability, but also changes public perceptions of the government’s commitment to meaningful reforms.

Due to the inflamed crises that characterize the Jordan’s neighborhood, the opposition movement has so far restrained itself from overt agitation for regime change. This patient resolve is perhaps rooted in the hopes that meaningful change might emerge through cooperation with the monarchy, rather than the revolutionary violence that has resulted in widespread human suffering elsewhere in the region. Unlike other places in the region, the government has the unlikely benefit of a relatively subdued opposition movement. It should capitalize on this level of calm agitation for change and dedicate more of its foreign assistance toward addressing the full breadth of opposition grievances.

The Limits of Narrow Counterterrorism Approaches

It is likely that the more visible results of effective counterterrorism support occur on the operational theater. Local security services elevate their targeting, surveillance, and response capabilities and gain an operational edge against insurgents and terrorist networks through US training and equipment support. However, when partner states accept US assistance, these transactions are also de facto political decisions with immense implications on the governed.

Recipient governments that focus their enhanced counterterrorism capabilities on regime survival or personal enrichment, as seen in Iraq, are unlikely to survive in the long-term. For others, security assistance and cooperation becomes a publically poisonous symbol of US encroachment on state sovereignty as seen in Yemen and Pakistan. In these environments, security-centered assistance is commonly squandered and US national interests harmed in the long-term.

The United States must therefore balance its security-dominant engagement with the Jordanian government and dedicate more resources to the socio-political and economic factors addressed herein. Placing governance and economic reform conditions on US security assistance, is the first step towards changing the United States’ reception within the Jordanian public. These conditions also incentivize the Jordanian government to balance security-based expenditures with the socio-economic investments that target the governance roots of instability. Over time, it is these investments that build economic, political, and social resilience throughout the Jordanian public and prevent radicalization among the most vulnerable sectors of the general public.

 

 

Peter Kirechu is a graduate student at the Mercyhurst Institute for Intelligence Studies where he focuses on civil strife, insurgencies and counterterrorism. Mr. Kirechu was also a 2013 Boren Scholar to Jordan where he studied the security and humanitarian effects of Syria’s civil conflict. Twitter: @PeterKirechu

Filed Under: Blog Article Tagged With: #COIN, Afghanistan, counterterrorism, Iraq, Jordan, Syria, terrorism, us, Yemen

To kill or to capture? The conundrum facing the Supreme Court and military operations

February 23, 2016 by W. M. Hart

By: W. M. Hart

Provincial Reconstruction Team Farah Conducts Quality Assurance Visit to Farah Prison
A local boy watches an inspection at a new prison in Farah province, Afghanistan (ISAF photo/ USAF 1st Lt Mark Graff). Source: Flickr

On 4 February 2016, heads of state and international organisations gathered in Westminster to discuss aid to Syria. At the same time, a mere stone’s throw away in the Supreme Court, the UK Government was finishing its argument in a case which could have profound impact on the way the UK undertakes future military detention operations.

Mohammed and others v Ministry of Defence is one of a number of cases the UK has fought in domestic and European courts regarding the conduct of hostilities in Iraq and Afghanistan.[1] The case before the Supreme Court is of particular interest as it crystallises a number of key issues, not least whether the UK had a legal power to detain people in non-international armed conflict and whether that detention is regulated by international humanitarian law or by human rights law.

The case principally concerns Serdar Mohammed, who was detained by British forces in Afghanistan in April 2010. He was suspected of being a senior Taliban Commander in the area and forensic tests showed that he had indeed come into contact with explosive material used in making IEDs. Mohammed was held by the UK on grounds of ‘mission accomplishment’ for the 96 hours allowed under ISAF standard operating procedures; he then continued to be held longer for ‘logistical reasons’. The UK wanted to transfer Mohammed to the Afghan authorities but they had no room to take him, their detention facilities in Lashkar Gah already being full. The UK held Mohammed for a total of 110 days, using internal military protocols to review and authorise his continued detention. Mohammed challenged the legality of his detention, arguing the UK was mistaken in fact (he was a farmer, not a fighter); that the UK had no legal power to detain him; and that in doing so the UK had breached the European Convention on Human Rights, in particular Article 5, which protects the right to liberty and security of the person.

In May 2014, the High Court found that while Mohammed was a lawfully detained by the UK for 96 hours, the rest of his detention was unlawful.[2] Subsequently, the Court of Appeal found that the Security Council Resolutions which authorised detention applied to ISAF, not specifically the UK, and that there was no basis in English law for Mohammed’s continued detention beyond that authorised by ISAF.[3]

These conclusions pose particular challenges for future military operations in non-international armed conflicts. Simply put – and there are some fiendishly complex legal arguments cutting across these points – there are four main issues. First and foremost, what do UN Security Council Resolutions actually authorise? Second, does a UNSCR trump regional or domestic human rights obligations? Third, to whom do these authorisations apply? And fourth, what law regulates the procedural protections in place when a person is detained?

What do UN Security Council Resolutions actually authorise?

UNSCR 1386, which set up ISAF, authorised ‘Member States participating in the International Security Assistance Force to take all necessary measures to fulfil its mandate’. The Supreme Court has to consider whether the phrase ‘all necessary measures’ includes detention as well as the use of lethal force. The Government argue it must, a fortiori: if the resolution authorises the use of lethal force, it must, as a matter of humanity, authorise the lesser measure of detention. The question of whether that authority to detain extends only to those who would otherwise be legitimately targeted, or a wider group of people (which is contemplated in international humanitarian law), is up for debate. To the defence establishment in the UK this ‘kill or capture’ dilemma is an absurdity. The lawyers acting for the claimants reject that logic, arguing instead the issue isn’t one of practical context but legal validity, and the UK simply didn’t have a legal basis in place at the time of Mohammed’s detention. A valid legal basis, they argue, could be a UNSCR which explicitly authorises internment – such as UNSCR 1546 for Iraq – or domestic legislation performing the same function as the U.S. Authorization for Use of Military Force.[4]

Does a UNSCR trump regional or domestic human rights obligations?

The relationship between the ECHR and UN Security Council resolutions has been broached – some might say sidestepped – before. In Al-Jedda, Strasbourg concluded that the Security Council resolutions authorising internment in Iraq did not conflict with any of the UK’s obligations under Article 5(1) of the ECHR, because the Security Council did not ‘intend to impose “any obligation’’ on member states to breach fundamental human rights’.[5] The preceding decision in the House of Lords disagreed, finding that Article 103 of the UN Charter created an obligation for the UK to detain and thus affected Article 5(1), but that the UK ‘must ensure that the detainee’s rights under Article 5 are not infringed to any greater extent than is inherent in such detention’.[6] The Ministry of Defence would prefer to follow the House of Lords and modify the content of Article 5. Whether Strasbourg or the Supreme Court is better placed to interpret the legal effect of Security Council Resolutions on the UK depends on one’s perspective of whether human rights law should be the dominant lens through which international legal obligations are viewed.

To whom do these authorisations apply?

The argument goes that if the UNSCR authorised ISAF to detain people, and the UK deviated from ISAF standard practice, the UK cannot subsequently claim that the UNSCR authorised it to detain. But as Aughey & Sari point out, the resolution authorises Member States and not ISAF itself. In addition, each nation in ISAF retained the discretion to apply national caveats depending on policy and legal obligations. If the court finds that either the ECHR trumps the UN Resolution in these circumstances, or that Article 5 governs the procedure for detention, the discretion the UK retains vis a vis coalition procedures could in future potentially be circumscribed by the ECHR.

Which brings us onto our last point; can international humanitarian law (IHL) guarantee a sufficient level of protection for the detainee’s due process rights in a non-international armed conflict (NIAC) as opposed to an international armed conflict (IAC)?

What law regulates the procedural protections in place when a person is detained?

The question of whether IHL, acting as lex specialis, can modify or displace Article 5 in an IAC was addressed by the European Court in Hassan.[7] In this decision – which is a critical part of the Government’s argument, and which wasn’t made at the time the Court of Appeal heard Mohammed – the ECtHR recognised that IHL is specially designed for armed conflict, and the Geneva Conventions have procedural protections designed for captured combatants and civilians. Unfortunately, treaty law covering IAC is far more extensive than for NIAC, which is reduced to relying on Common Article 3 of the Geneva Conventions, Additional Protocol II and customary international law.

The Government argued that IAC protections should apply to NIAC by analogy, and do in any event by custom. For example, the Iraq conflict went through various characterisations – international armed conflict, occupation, non-international armed conflict. Each of these classifications has different legal rules and to have different rules applying from one day to the next is logically and practically challenging, if not impossible. In addition, the mouth twisting phrase ‘internationalised non-international armed conflict’ is used to describe the situation in Afghanistan from 2001 onwards – regardless of whether it was officially a NIAC, the British experience in Helmand looked, sounded and felt very much like any other international conflict on the ground. However, if Article 5(1) was engaged, as Mohammed and others claim, their rights were infringed by the lack of due process afforded to them on detention. Even if applicable, neither CA3, APII or custom provided any procedural protections for detainees, but human rights law did and was not applied.

The way the Supreme Court reasons this issue will have implications for the structure of the detention operations and for the level of protections afforded to detainees in future. Will they, for example, have their detention approved by a military official, a military judge, or a civilian judge? How would the practicalities of such hearings be managed?

Serdar Mohammed shows us that the relationship between international humanitarian law and human rights law is not necessarily a bed of roses; at times it more closely resembles a nest of thorns. The case also raises many other questions; what locus do different courts have to decide how international law should be balanced and interpreted? How can IHL be applied by analogy to NIACs, despite clear reluctance of states in the treaty negotiation process to do so? Can human rights be divided and tailored, or derogated from in an implied manner by states? Is it possible to establish customary international law from practice in non-international armed conflicts?

The Supreme Court is in the unenviable position of having to decide a host of principles which will affect the scope and shape of future military detention operations. The UK Government has ruled out boots on the ground in Syria for now.[8] But if it did deploy the armed forces, it would have to shape the jus ad bellum justification in the UNSCR, the rules of engagement and the process of detention operations in line with this, and other, legal precedents.

 

W. M. Hart is a doctoral candidate at the Department of War Studies, King’s College London, researching the effect of human rights litigation on military operations.

 

 

Notes:

[1] Mohammed and others (Respondents) v Ministry of Defence (Appellant), currently before the Supreme Court, Case ID: UKSC 2015/0218 is joined with Abd Ali Hameed Ali Al-Waheed v Ministry of Defence. Mr. Al-Waheed was detained by British forces in Iraq.

[2] Serdar Mohammed v Ministry of Defence [2014] EWHC 1369 (QB)

[3] Serdar Mohammed v Secretary of State for Defence [2015] EWCA Civ 843

[4] Authorization for Military Use of Force (AUMF), Pub. L. No. 107-40, 115 Stat. 224 (2001). See Curtis A. Bradley and Jack L. Goldsmith, ‘Congressional Authorization and the War on Terror’, Harvard Law Review, 118 (2005) 2047-2133

[5] Jelena Pejic, ‘The ECtHR’s Al-Jedda Judgment: Implications for IHL’, Yearbook of International Humanitarian Law, 14 (2011) 237-253

[6] R (on the application of Al-Jedda) v Secretary of State for Defence [2007] UKHL 58

[7] European Court of Human Rights, Case of Hassan V. The United Kingdom (Application no. 29750/09), 16 September 2014

[8] Reuters, ‘Cameron rules out British ground troops in case for Syria airstrikes’ (26 November 2015). Available at: https://www.rt.com/uk/323525-cameron-parliament-syria-airstrikes/ Accessed on: 8 February 2016

 

#_ednref8

Filed Under: Blog Article Tagged With: Afghanistan, Detention, human rights

A war on humanitarianism?

November 19, 2015 by Mélanie Thienard

By: Mélanie Thienard

GBU-38_munition_explosions_in_Iraq.jpg
Source: Wikimedia

 

Is the United States waging a war on humanitarianism?

On 26 October 2015, a Médecins Sans Frontières (MSF) hospital in Northern Yemen was struck by airstrikes, allegedly conducted by the US-supported, Saudi-led coalition, who have denied any implication in the destruction of the hospital. Earlier that month, on the 3rd of October, another MSF hospital was destroyed by the sustained fire of a US Air Force AC-130U gunship in Kunduz, Afghanistan.

In a series of press articles, French academic Gilles Dorronsoro claimed that these attacks in fact reflect a criminalisation of humanitarianism. According to him, former US Secretary of state Colin Powell tried to use humanitarian organisations in the War on Terror. It is the refusal of MSF to become ’essential contributors to the United States’ “combat team”’ which, according to Dorronsoro, led the organisation to become a legitimate target for the US army in what he described as a ‘war on humanitarianism.’ Whilst this remains speculative, other matters arose from the Kunduz bombing and the US justifications: a lack of verification of targets and/or a disregard for the core International Humanitarian Law (IHL) principle of proportionality.

International humanitarian law, hospitals, and the principle of caution

The body of law governing the conduct of hostilities is clear on the status of hospitals:

’Directing an attack against a zone established to shelter the wounded, the sick and civilians from the effects of hostilities is prohibited[1].’

The UN General Assembly reaffirmed this principle with a resolution: ‘places or areas designated for the sole protection of civilians, such as hospital zones or similar refuges, should not be the object of military operations’.[2]

To uphold their protected status, hospitals set up by humanitarian organisations, such as MSF, must communicate their geographical position to all fighting parties on a regular basis. MSF is well aware that it is crucial to ensure the relative safety of both staff and patients. In fact, the GPS coordinates of the Kunduz hospital were last communicated to the coalition forces only days before its destruction.

Military necessity and proportionality

Only a few hours after the first US statements attributing the attack to a ‘mistake’, US commander in Afghanistan General John Campbell hinted that the attack on the Kunduz Trauma Hospital was justified by military necessity after Afghan forces allegedly came under Taliban fire. In this approach, the hospital was engaged deliberately rather than ‘mistakenly struck.’ Is that legal? In certain circumstances, yes.

‘The “principle of military necessity” permits measures which are actually necessary to accomplish a legitimate military purpose and are not otherwise prohibited by international humanitarian law. In the case of an armed conflict the only legitimate military purpose is to weaken the military capacity of the other parties to the conflict.[3]’

The surviving MSF staff in Kunduz however strongly denied the presence of active combatants in their facilities at the time of the attacks.

Military necessity is, however, not unlimited. It is in fact bound by another essential component of IHL: proportionality. In terms of IHL, proportionality ‘seeks to limit damage [to civilians and civilian objects] caused by military operations by requiring that the effects of the means and methods of warfare used must not be disproportionate to the military advantage sought’.[4]

Considering the above IHL principles, let’s imagine that Taliban combatants were indeed using the hospital to target coalition forces.

Two questions remain unanswered. On a tactical level, was Taliban fire sustained enough to justify the call of an air strike on a civilian building? Strategically, would razing a perfectly functional hospital to the ground – killing 30 staff and patients and depriving thousands of civilians from accessing medical treatment – be critical to regain control of the city of Kunduz after it had been seized by Taliban fighters? If the answer to both is yes, the strike could be legally justified. If, however, the answers are uncertain, so is the legality of the attack.

An intelligence failure and the role of the Afghan forces

A final question, potentially the most important one, remains. Did the Afghan forces deliberately provided flawed intelligence to the US forces to justify the call of the airstrike?

As mentioned previously, the Afghan forces have claimed the presence of Taliban fighters in the hospital’s main compound, which prompted a muted, even sympathetic Afghan response to the attack.

A military coalition must be based on a certain degree of trust. It is doubtful that the US forces in Afghanistan possess the capability of double-checking every action of their Afghan allies. Such a policy could furthermore create a hierarchy between US and Afghan forces, which could undermine the coalition as a whole. If it turns out that the Afghan forces indeed provided flawed intelligence, drastic measures need to be taken to ensure the verification of targets by US operatives before a strike.

However, let’s not forget that, in the end, US forces pulled the trigger. Communication transcripts show that the gunship’s crew questioned the legality of the airstrike, but were nevertheless ordered to engage the hospital. General Campbell also admitted that ‘the decision to provide aerial fires was a US decision, made within the US chain of command.’ No one forced the US forces to take Afghan intelligence at face value. To the General director of MSF, it is clear that the attack constitutes a war crime as well an attack on the Geneva conventions.

Claiming that a ‘war against humanitarianism’ is being waged is in this case far-fetched and misleading. Such claims however show that, when it comes to foreign military intervention, the US is walking on eggshells and faces grave accusations of disregard of IHL and civilian lives.

The destruction of the Kunduz hospital shows two worrying trends at the operational level: a flawed chain of command, and the dissemination of flawed intelligence by Afghan forces. Whilst the advancements in targeting technology led some to argue that only the US army was capable of conducting warfare in accordance with the principles set forth by IHL, incidents such as the Kunduz bombing show a critical lack of communication between units with regard to the selection of targets. This makes the US army vulnerable to embarrassing ‘mistakes’ and war crime accusations as well as putting humanitarian NGOs working in active combat zones even more at risk.

The only way to address these issues in a constructive manner is for President Obama to answer the calls of MSF and consent to an independent and impartial investigation of the Kunduz attack.

Even war has rules.

 

 

Notes:

[1] Article 15, Fourth Geneva Convention, § 3, available at https://www.icrc.org/customary-ihl/eng/docs/v1_cha_chapter11_rule35

[2] UN General Assembly, Res. 2675 (XXV), §6 available at http://www.un.org/documents/ga/res/25/ares25.htm

[3] https://www.icrc.org/casebook/doc/glossary/military-necessity-glossary.htm

[4] https://www.icrc.org/casebook/doc/glossary/proportionality-glossary.htm

 

 

Mélanie is a 3rd year IR student specializing in the Middle East, human rights and humanitarian law, president of the Amnesty International Society at King’s and has worked at Amnesty International UK since 2014 as a national student representative. Prior to coming to King’s she studied law and economics in Marseille, France.

Filed Under: Blog Article Tagged With: Afghanistan, Humanitarian law, Kunduz, Médecins Sans Frontières, MSI, Taliban, terrorism, US Foreign Policy, USA, Yemen

Is remote control effective in solving security problems?

October 20, 2015 by Strife Staff

By: Chad Daniel Tumelty

https://upload.wikimedia.org/wikipedia/commons/8/89/MQ-9_Reaper_UAV.jpg
https://upload.wikimedia.org/wikipedia/commons/8/89/MQ-9_Reaper_UAV.jpg

Editors note: Remote Control is a project hosted by the London-based think tank Oxford Research Group, set up to examine changes in military engagement, in particular the use of drones, special forces, private military companies and cyber warfare. They recently hosted an essay competition for participants in response to the question ‘Is remote control effective in solving security problems?’ Both Chad Tumelty and Archie Jobson of King’s College London achieved runner up. Strife is proud to feature them as your long read of the week over the coming two weeks.

* * *

Drones manifest both the concept and operation of remote control. As more states acquire and use drones to perform tasks previously performed by manned aircraft the effect that this transition of control will have upon wider state security will become clear. However as yet it is not. As such it is important to not only to think about how effective drones may be in solving security problems but also the wider impact this may have. The argument presented here is that the effectiveness of drones in solving state security problems will not be determined by the technology that allows them to be controlled remotely but in how states utilise that technology without impacting upon the security of other states. While drones can increase a state’s security by performing sorties that manned aircraft cannot, offering unparalleled persistence over borders and maritime interests, in areas where relations between states are strained such employment may be misperceived and create a security dilemma. Although drones enable states to conduct dangerous reconnaissance flights remotely without any risk to a pilot, epitomizing the concept of post-heroic warfare, this risks states becoming more inclined to conduct more politically precarious operations, potentially eroding security.

Introduction

Drones represent the perfect manifestation of both the concept and operation of remote control in technological form. The growing ubiquity and employment of drones represents one of the most salient technological developments to impact upon state security in recent times. Both the number of states acquiring drones as well as the number and variety they are acquiring is growing; with over ninety states now operating them, and a further twenty actively developing them.[2] Commonly referred to as unmanned aerial vehicles (UAVs), or more accurately remotely piloted aircraft (RPA), drones allow states to exercise many of the same operations performed by manned aircraft through systems of remote control, sometimes at greater efficiently or at lower risk. Although certain elements of some drones operations are automated, such as take-off and landing, they are often confused as being autonomous systems; ones that can perform a task or function without human input once activated.[3] While drones are being increasing used to perform security tasks instead of manned aircraft, the effect that this transition to remote control will have upon on state security is not yet clear.

The current U.S. exceptional use of armed UAVs to conduct targeted killings of suspected terrorists and insurgents outside of traditional battlefields, such as in Pakistan, Somalia and Yemen, by President Obama’s administration has raised both the profile and controversy surrounding drones.[4] Despite this, even before the first armed General Atomics MQ-1 Predator was tested in 2001 the use of drones was a growing feature of state security activity in non-lethal intelligence, surveillance and reconnaissance (ISR) roles; such as the American use of such systems in the Gulf War and operations in Bosnia and Kosovo, as well as frequent Israeli deployment of drones since the 1980’s.[5] Historically drones have been operated as such intelligence gathering platforms, most notably by the U.S. National Reconnaissance Office (NRO) throughout the Cold War.[6] Outside of military and intelligence applications, drones are now also being used for a variety of non-lethal ISR roles by both state and non-state actors, including counter-trafficking surveillance, border patrols, search and rescue operations, and environmental monitoring, while it is as widely considered that drones have the potential to be used in almost ‘endless’ commercial applications.[7] Many also view the limited use of UAVs by Hezbollah as the possible prelude to their widespread use by other terrorist groups.[8] Given their proliferation, it is important to understand how effective the use of remotely controlled drones will be in solving a state’s security problems but also to consider the wider impact this may have upon their security.

The impact that drones will have upon security will not be determined by the technology behind making an aircraft unmanned but on how states utilise the remote control that drones offer and how other states will react to this in turn. In order to evaluate how effective remote control is in solving security problems this essay will explore the employment of drones by states to perform security functions associated with ISR applications. It will argue that while the uses drones in such roles may increase a state’s security in a number of ways by performing onerous functions that manned aircraft cannot, the perceived low risk to their employment may potentially erode security however by increasing the inclination of states to undertake more intrusive operations against others, both politically and physically, which they would not do with manned aircraft. In order to illustrate this, this essay will consider both the ‘dull’ surveillance and ‘dangerous’ reconnaissance tasks that drones are commonly conceived as being especially suited for, as reflected in both British and American doctrines on RPA.[9] The first section will consider how by performing surveillance flights previously considered too dull for manned aircraft the remote control offered by drones can effectively increase a state’s security by enabling persistent loitering over borders, waters and other national interests, and then consider the potential impact this may have in creating a security dilemma. The second section will explore the issue of greater concern and the use of drones to conduct dangerous reconnaissance and intelligence gathering missions over an adversaries territory, and how this risks creating insecurity between states through this post-heroic use of airpower.

Dull Surveillance

It is often the limits of human endurance that constitutes the weak link in the time that an aircraft can remain airborne. Occasionally exceptional efforts have been made to overcome these limitations, such as during the Kosovo intervention when American Northrop Grumman B-2 Spirit bombers flew with two crews on-board during their thirty hour roundtrip missions from their base in the continental U.S. to Serbia.[10] However pilot fatigue has mainly been the constraining factor of flight-times and not aeronautical engineering. By removing the manned element in the aircraft drones ameliorate this issue through remote control and allow for missions requiring significant endurance that have been previously classified as either too dull or difficult to be flown. For example, the Northrop Grumman RQ-4 Global Hawk, often suggested in the U.S. as a replacement for their Lockheed U-2 spy plane, nicknamed the ‘Dragon Lady’, is able remain airborne in excess of thirty hours over long ranges but can operate either through automation on preprogramed flight paths or by pilots working in shifts through remote control, negating the constraint of fatigue.[11] Drones then, as put by former Royal Air Force Air Chief Marshal Sir Brian Burridge, enable the ‘holy grail of air power: persistence’ which in turn opens up new ways in which such aircraft can be utilised to increase state security enabled through remote control.[12]

It is through this persistence that drones offer states which confers upon them the ability to improve their security situation by increasing the protection of previously vulnerable areas or assets through extended surveillance. RPA are commonly referenced by many as a suitable solution to protecting and monitoring ‘vulnerable targets at sea’, such as merchant shipping, tankers, oil rigs and pipelines, through the exploitation of the persistence offered by remote control.[13] The British vision for drones primarily involves them undertaking many maritime security tasks, that are either not suited to naval assets or that are currently performed by manned aircraft but require multiple sorties; such tasks include littoral monitoring, anti-submarine patrols, counter-piracy tasks, fisheries protection and ocean scanning.[14] Both the U.S. Coast Guard and Navy already employ a number of UAVs to conduct these tasks.[15] Drones can also increase a state’s terrestrial security by performing dull flights. In 2005, the U.S. Congress authorized its Customs and Border Protection to purchase unarmed Predators to conduct its border patrols and surveillance more effectively and easily.[16] Since then a number of other federal agencies including the Missile Defense Agency, Drug Enforcement Administration and Department of Transport, as well as growing number of local sheriff and police departments, have acquired a multitude of drones for the purpose of increasing U.S. national security.[17]

By offering the ability to perform flights previously considered too dull, laborious or costly drones can effectively increase a state’s security. The persistent ISR capability that drones offer through remote control at decreased manpower and aircraft fatigue means that previously vulnerable assets or exploitable areas can now be protected. For example, during initial operations in Afghanistan the U.S. Air Force was able to operate twenty four separate Predator missions to provide ‘coverage round the clock’ in supporting troops; a task that would have proven extremely demanding on both aircraft and personnel if attempted with manned assets.[18] This capability can be easily adapted to increase national security or protect national interests. It should be noted that such operations do come at a high cost however, meaning that not all states could afford to mount such operations and most could not do so over multiple areas at once. A single Predator for example costs a little under $4.5 million, of which a quarter accounts for just the surveillance package, while it requires 168 people working across multiple areas to operate one for, and maintain it after, just twenty four hours of flight.[19] As developments in UAV technology continue to advance and market dynamics ensue it is likely that more advanced drones will be become widely available. It should be noted that not every state will require expensive high altitude, long endurance UAVs such as the Global Hawk or Predator, and will be able to adapt the wide variety of cheaper commercially available drones to meet their own unique security needs. The growing sophistication of drones costing even hundreds of dollars means that they have the potential capacity to produce significant security effects if sophistically deployed.[20]

The use of RPA in such dull surveillance roles may have unforeseen consequences however. Widespread state use of drones on interstate borders and over common waters may invoke a ‘security dilemma’; where steps taken by one state to increase their security undermines the security of other states.[21] When outlining the dilemma in 1978, Robert Jervis noted that ‘inspection devices can ameliorate the security dilemma’ by providing states with a ‘warning of coming dangers’ over their border and waters, but warned that; ‘attempts to establish buffer zones can alarm others who have stakes there, who fear that undesirable precedents will be set, or who believe that their own vulnerability will be increased.’[22] It is through such employment that drones have the potential to create security problems for states. Although the widespread use of drones by various U.S. federal agencies over its shared borders has not concerned either Mexico or Canada this is jointly due to the historical norms of friendly relations between the U.S. and its neighbours and the bi-lateral security benefits of their border protection, ballistic missile defence and counter-narcotics missions.[23] In regions where there are contested territorial disputes, such as the South China Sea, or where relationships between neighbours are particularly strained or actively hostile, then the introduction of similar practices with drones may increase tension between states. For example, despite repeated calls to do so the U.S. has refused to provide even unarmed UAVs to Ukraine to perform ISR roles, fearing that it might antagonise Russia further and prompt an escalation in the use of force.[24]

A way of evaluating this potential effect of such security operations with drones is through the lens of the offense-defence balance. This theory suggests that when it is technologically easier for a state to mount offensive action there is a greater probability of conflict, but when defence has the advantage the reverse is true.[25] Therefore if drones are seen as an enabler of territorial conquest and annexation then their widespread use over international boundaries and waters may induce friction between states, however if they are perceived as performing a security function then they could reduce the potential for conflict.[26] While it is difficult to classify technology as either offensive or defensive, Jack Levy has argued that some characteristics such as mobility will inherently offer greater offensive potential than others, such as armament, protection, endurance or even striking power.[27] On a similar vein, recently Peter Singer has noted how emerging technologies such as drones and robotics ‘are perceived as helping the offensive side in a war more than defence’ due to their ability to be operated remotely.[28] Although a fierce critic of the use of drones to conduct targeted killing operations, General Stanley McChrystal has reported how RPA employed in ISR roles were an effective force multiplier for the U.S. Joint Special Operations Command when he led them in Iraq, in that they provided unparalleled situational awareness and improved command and control which enabled his forces to conduct multiple commando raids per night.[29] Therefore there is the potential that drones could produce friction between states when performing surveillance security tasks over shared areas or borders, regardless of their armament, due to the inherent quality of some of their traits, including remote control, in enabling states to conduct offensive operations.

Dangerous Reconnaissance

Reconnaissance flights over an adversary’s territory have historically been the most dangerous mission undertaken by aircraft.[30] The recent downing and subsequent execution of Jordanian pilot Lieutenant Muadh al-Kasasbeh at the hands of Islamic State and Iraq and the Levant over Syria on the 24th December 2014 illustrates the danger that ISR sorties over an enemy’s territory can entail.[31] In addition to the risk to a pilot’s life reconnaissance flights have also carried the most political risk. On the 1st May 1960 the Soviet Union shot down an American U-2 flying over its territory, captured its pilot Major Gary Powers, and then proceeded to arrest him for spying and paraded him on television, causing ‘a devastating blow to the U.S.’s international prestige’.[32] The ensuing political fallout meant that American manned reconnaissance flights over the Soviet Union ceased; ‘What had been an acceptable risk on 1 May became unacceptable politically and militarily on 2 May.’[33] It was these very risks that drones helped to eliminate through remote control. As previously noted, it has been in the ISR role over hostile territory that drones have historically been employed. For example, drones were extensively employed to monitor China’s nuclear program and throughout the Cold War the NRO flew numerous drone reconnaissance sorties over the Chinese nuclear test site at Lop Nor to gain details of their nuclear testing and arsenal.[34] On the 15th November 1964 China shot down a U.S. Ryan AQM-34 Firebee in an event which ‘made the front page of The New York Times, but created little controversy.’[35] The loss of seven more drones over China between 1965 and 1975 ‘went virtually unnoticed’ with these events creating almost no political fallout despite conducting essentially the same activity that Powers had been over the Soviet Union.[36] It is due to this record that Ann Rogers and John Hill argue that drones solve what they term the ‘Gary Powers problem’ simply by being unmanned and remotely controlled, appearing to ‘manifest a less obvious trespass than a manned incursion’.[37] It is this perception of drone reconnaissance flights that may potentially carry with it the greatest risks to state security.

The fact that drones are piloted remotely means that the calculation of risk concerning their employment for dangerous flights such as reconnaissance sorties is altered. In other words, drones allow leaders to ‘take risks’ that they would ‘hesitate to do with manned aircraft’.[38] The legacy of RPA use throughout the Cold War as well as their current employment stands testament to this. David Dunn argues that because they are controlled remotely and therefore disembodied, drones ‘disrupt the calculus of risk’ in those who employ them by convincing them that their use in sensitive mission can be conducted with ‘domestic political impunity, minimal international response and low political risk’.[39] Peter Singer terms this the ‘dark irony’ of drones, in that by removing the potential risk of the loss of life related to dangerous missions through remote control drones ‘may seduce us into more wars’ by making it more likely that leaders would employ them.[40] The recent Birmingham Policy Commission report on drones stated that it found such arguments of drones ‘lowering the threshold to the use of force’, as they are unmanned and controlled remotely, unconvincing based on the evidence they heard.[41] It should be noted that this was only in a British context however, and this perception of drones may indeed invoke such reckless use by other states. In a 2011 doctrine publication on drones the U.K.’s Ministry of Defence stated that; ‘an opponent that succeeds in shooting down an unmanned aircraft has little to show for it but some wreckage – which they can easily be accused of fabricating, or for which ownership can simply be denied’. [42] This illustrates that, contrary to the Birmingham Policy Commission’s findings, there may be some within British policy making circles that disregard the risk of drone employment on sensitive reconnaissance missions.

The view that drones may increase the risk of confrontation between states by presenting no risk to a pilot’s life is tied to the idea of post-heroic warfare. Coined by Edward Luttwak, post-heroic warfare describes a condition where force may be employed easily and without restraint by states provided that doing so carries no risk of casualties, enabled by the full exploitation of technologies which remove humans from harm.[43] It is frequently noted that for many states; ‘It is becoming harder to envision sending manned reconnaissance assets into denied, hostile airspace’, due to the casualty aversion of their societies.[44] Drones solve this issue through remote control by offering leaders the ‘seductive’ ability to conduct dangerous missions without risking the sacrifice or political blowback entailed with manned aircraft.[45] In this way drones therefore embody the concept of post-heroic warfare. Peter Singer notes that; ‘By removing warriors completely from risk and fear, unmanned systems create the first complete break in the ancient connection that defines warriors and their soldierly values.’[46] The effects of this separation are not yet clear, but the wider employment of drones by many states would appear to clarify that it has changed the perception of risk in conducting dangerous or politically sensitive missions. Examples of this have already been seen with Israel’s extensive use of drones to gather targeting information and intelligence over Syria, or more recently Russia’s use of unarmed UAVs over Ukraine to support the separatists with artillery observation.[47]

Although there is some suggestion that states currently appear to view drone reconnaissance sorties as unobtrusive events politically, as these systems become more widely utilised by a greater number of actors this norm could become eroded. The Birmingham Policy Commission noted that many states are beginning to recognise that their air defence posture is unsuitable for drones and are already pursuing research and development projects into anti-drone defences in order to remedy this, indicating that this shift in norms may already be taking place.[48] For example, while current U.S. air defences can defeat a wide range of aerial threats a significant gap exists in that low flying, small UAVs cannot be detected by their ground based radar arrays, meaning that such drones could easily penetrate their airspace.[49] This is related to the offense-defence balance. Although the characteristics of drone technology may make it inherently suited to offense, the balance is also about the relative resources that a state must invest in their own defences in order to counter an opponent’s offensive capabilities; ‘When a technological innovation changes the relative costs of offensive and defensive capabilities, the offense-defense balance shifts.’[50] As most states do not possess the necessary means to counter the wide array of RPA that exist the continued proliferation of drones and their use in the air space of other sovereign state may upset the offense-defence balance. This issue may become more prominent as technical developments continue to make stealth technology cheaper and more widely available.[51] If this occurs then drones flying dangerous reconnaissance missions could destabilise relations between states, potentially leading to a security dilemma. This could be particularly perilous during periods of increased tension between states. A prominent example of this was on the 27th October 1962 when an American U-2 was shot down conducting reconnaissance over Cuba at the height of the Missile Crisis in an event that heightened tensions between the U.S. and the Soviet Union, and almost induced miscalculation at a period when the potential of a nuclear exchange was very real.[52]

Conclusion

In conclusion, while drones may be effective in solving some state security problems this may come at considerable political cost that will have a profound impact on wider state security, the effects of which are not yet clear. Drones can increase state security by performing surveillance sorties that manned aircraft cannot by offering the persistence needed to protect national borders, waters and other national security interests through remote control. In areas where relations between states are strained however such employment may be misperceived under the security dilemma. By enabling states to conduct dangerous reconnaissance flights remotely without any risk to a pilot, epitomizing the concept of post-heroic warfare, drones create a perception of low risk to their employment which may potentially increasing the inclination of leaders to take risks. This carries with it the risk that states will be more inclined to conduct more politically and physically intrusive operations that will erode relations between states impacting security. The effectiveness of drones in solving security problems will not be determined by the technology that allows an unmanned aircraft to be controlled remotely but upon how norms of use are developed over time as to how states can utilise that technology to solve their security problems without impacting upon the security of another state.

Chad is currently studying for an MA in Science and Security at King’s College London. He is writing his dissertation on the bulk collection of metadata by the U.S. National Security Agency. Previously Chad completed a BA in War Studies, also at King’s College London, for which he was awarded a first class honours. He is currently interning at Realeyes, a tech start-up, which provides facial coding and emotions analytical services to brands, advertising agencies and media companies.

[1] An earlier version of this essay was submitted in partial requirement for the postgraduate module “Current Issues in Science and Security”, at the Department of War Studies, King’s College London, on the 25th March 2015.

[2] Kelley Sayler (2015), A World of Proliferated Drones: A Technology Primer, (Washington, D.C.: Center for a New American Security), p. 8

[3] Paul Scharre (2015), Between a Roomba and a Terminator: What is Autonomy?, War On The Rocks, http://warontherocks.com/2015/02/between-a-roomba-and-a-terminator-what-is-autonomy/ , 18/02/2015

[4] Kenneth Anderson (2010), Rise of the Drones: Unmanned Systems and the Future of War, testimony submitted to the U.S. House of Representatives Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, (23rd March 2010), p. 1

[5] Air Chief Marshall Sir Brian Burridge (2003), UAVs and the dawn of post-modern warfare: A perspective on recent operations, The RUSI Journal, (148:5, pp. 18-23), p. 18

[6] Thomas P. Ehrhard (2010), Air Force UAVs: The Secret History, (Washington, D.C.: Mitchell Institute Press), pp. 2-5

[7] Medea Benjamin (2013), Drone Warfare: Killing By Remote Control, (London: Verso), p. 15

[8] Brian A. Jackson & David R. Frelinger (2009), Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?, (Santa Monica: RAND Corporation), p. 7

[9] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, (Washington, D.C.: Department of Defense), p. 1; and, Joint Doctrine Note 2/11(2011), The UK Approach to Unmanned Aircraft Systems, (Shivernham: Ministry of Defence), p. 3-4

[10] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, p. 2

[11] Richard A. Best Jr. & Christopher Bolkcom (2000), Airborne Intelligence, Surveillance & Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs, (Washington, D.C.: Congressional Research Service), p. 2

[12] Air Chief Marshall Sir Brian Burridge (2005), Post-Modern Warfighting with Unmanned Vehicle Systems: Esoteric Chimera or Essential Capability?, The RUSI Journal, (150:5, pp. 20-23), p. 20

[13] Peter W. Singer (2009), Wired For War: The Robotics Revolution and Conflict in the Twenty-first Century, (London: Penguin), p. 227

[14] Joint Doctrine Note 2/11(2011), The UK Approach to Unmanned Aircraft Systems, p. 3-4

[15] Jeremiah Gertler (2012), U.S. Unmanned Aerial Systems, (Washington, D.C.: Congressional Research Service), p. 23

[16] Benjamin (2013), Drone Warfare, p. 75

[17] Gertler (2012), U.S. Unmanned Aerial Systems, p. 23

[18] John D. Blom (2010), Unmanned Aerial Systems: A Historical Perspective, (Fort Leavenworth: Combat Studies Institute Press), p. 108; and, Singer (2009), Wired For War, p. 33

[20] Sayler (2015), A World of Proliferated Drones, p. 29

[21] Robert Jervis (1978), Cooperation Under The Security Dilemma, World Politics, (30:2, pp. 167-214), p. 169

[22] Ibid, pp. 169-181

[23] Benjamin (2013), Drone Warfare, p. 75

[24] Adam Rawnsley (2015), Ukraine Scrambles For UAVs, But Russian Drones Own The Sky, War Is Boring, https://medium.com/war-is-boring/ukraine-scrambles-for-uavs-but-russian-drones-own-the-skies-74f5007183a2, 20/02/2015

[25] Sean M. Lynn-Jones (1995), Offense-Defense Theory And Its Critics, Security Studies, (4:4, pp. 660-691), p. 661

[26] Jack S. Levy (1984), The Offensive/Defensive Balance Theory of Military Technology: A Theoretical and Historical Analysis, International Studies Quarterly, (28:2, pp. 219-238), p. 223

[27] Ibid, p. 225

[28] Singer (2009), Wired For War, pp. 321-332

[29] Gideon Rose (2013), Generation Kill: A Conversation with Stanley McChrystal, Foreign Affairs, (92:2 , pp.2-8), pp. 4-5

[30] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, p. 2

[31] Martin Chulov & Shiv Malik (2015), Isis video shows Jordanian hostage being burned to death, The Guardian, http://www.theguardian.com/world/2015/feb/03/isis-video-jordanian-hostage-burdning-death-muadh-al-kasabeh, 04/02/2015

[32] Major Christopher A. James (1997), Unmanned Aerial Vehicles (UAVs): An Assessment of Historical Operations and Future Possibilities, (Montgomery: Air Command and Staff College), p. 3

[33] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, p. 2

[34] Ehrhard (2010), Air Force UAVs, pp. 9-10

[35] Ibid.

[36] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, p. 2

[37] Ann Rogers & John Hill (2014), Unmanned: Drone Warfare and Global Security, (London: Pluto Press), p. 2

[38] Lynn E. Davis, Michael J. McNemey, James Chow, James, Thomas Hamilton, Sarah Harding & Daniel Byman (2014), Armed and Dangerous? UAVs and U.S. Security, (Santa Monica: RAND Corporation), p. 11

[39] David H. Dunn (2013), Drones: disembodied aerial warfare and the unarticulated threat, International Affairs, (89:5, pp. 1237-1246), p. 1238

[40] Singer (2009), Wired For War, p. 322

[41] Birmingham Policy Commission Report (2014), The Security Impact of Drones: Challenges and Opportunities for the UK, (Birmingham: University of Birmingham), p. 59

[42] Joint Doctrine Note 2/11 (2011), The UK Approach to Unmanned Aircraft Systems, p. 3-7

[43] Edward N. Luttwak (1995), Toward Post-Heroic Warfare, Foreign Affairs, (74:3, pp. 109-122), p.112

[44] James (1997), Unmanned Aerial Vehicles (UAVs), p. 55

[45] Singer (2009), Wired For War, p. 321

[46] Ibid, p. 332

[47] Patrick Tucker (2015), In Ukraine, Tomorrow’s Drone War Is Alive Today, Defense One, http://www.defenseone.com/technology/2015/03/ukraine-tomorrows-drone-war-alive-today/107085/, 09/03/2015

[48] Birmingham Policy Commission Report (2014), The Security Impact of Drones, p. 29

[49] Davis et al. (2014), Armed and Dangerous?, pp. 4-6

[50] Lynn-Jones (1995), Offense-Defense Theory And Its Critics, p. 667

[51] Davis et al. (2014), Armed and Dangerous?, p. 4

[52] Rogers & Hill (2014), Unmanned, p. 21

Filed Under: Long read Tagged With: Afghanistan, drones, Predator, Reaper, security, surveillance, UAV

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Footer

Contact

The Strife Blog & Journal

King’s College London
Department of War Studies
Strand Campus
London
WC2R 2LS
United Kingdom

[email protected]

 

Recent Posts

  • Beyond Beijing: Russia in the Indo-Pacific
  • Book Review: The Father of Modern Vaccine Misinformation - “The Doctor Who Fooled the World: Science, Deception, and the War on Vaccines” by Brian Deer
  • Strife Call for Papers: 2022 Series
  • Space Age Threat: How Hypersonic Missiles Are Changing Strategic Stability
  • A View to the Threat Environment: Perspective from General David H. Petraeus

Tags

Afghanistan Africa Brexit China Climate Change conflict counterterrorism COVID-19 Cybersecurity Cyber Security Diplomacy Donald Trump drones Elections EU feature France India intelligence Iran Iraq ISIL ISIS Israel ma Myanmar NATO North Korea nuclear Pakistan Politics Russia security strategy Strife series Syria terrorism Turkey UK Ukraine United States us USA women Yemen

Licensed under Creative Commons (Attribution, Non-Commercial, No Derivatives) | Proudly powered by Wordpress & the Genesis Framework