• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • About
    • Editorial Staff
      • Bryan Strawser, Editor in Chief, Strife
      • Dr Anna B. Plunkett, Founder, Women in Writing
      • Strife Journal Editors
      • Strife Blog Editors
      • Strife Communications Team
      • Senior Editors
      • Series Editors
      • Copy Editors
      • Strife Writing Fellows
      • Commissioning Editors
      • War Studies @ 60 Project Team
      • Web Team
    • Publication Ethics
    • Open Access Statement
  • Archive
  • Series
  • Strife Journal
  • Strife Policy Papers
    • Strife Policy Papers: Submission Guidelines
    • Vol 1, Issue 1 (June 2022): Perils in Plain Sight
  • Contact us
  • Submit to Strife!

Strife

The Academic Blog of the Department of War Studies, King's College London

  • Announcements
  • Articles
  • Book Reviews
  • Call for Papers
  • Features
  • Interviews
  • Strife Policy Papers
    • Strife Policy Papers: Submission Guidelines
    • Vol 1, Issue 1 (June 2022): Perils in Plain Sight
You are here: Home / Archives for drones

drones

India’s eye in the sky: combat drones in the Kashmiri equation

November 1, 2016 by Gen Kawasaki and Chu Kah Leong

By: Gen Kawasaki and Chu Kah Leong

A Predator C Avenger Unmanned Aircraft System (U.S. Navy photo by Mass Communication Specialist 1st Class Peter D. Lawlor/Released)
A Predator-C Avenger Unmanned Aircraft System (U.S. Navy photo by Mass Communication Specialist 1st Class Peter D. Lawlor/Released)

The use of drones as a sophisticated means of deterrence and tactical precision has constituted one of the most prominent features of counterinsurgency in the twenty-first century. Represented in this instance by India’s ongoing negotiations for a drone partnership with the U.S., this newfound interest sheds important light on the changing means and ends of counterinsurgency and political violence within the already tenuous cords of Kashmiri security.[1]

Historically, India has proven itself as a seasoned practitioner of conventional force to achieve strategic goals in Kashmir. Military responses to Kashmiri insurgent movements since the 1980s – culminating in tens of thousands of casualties thus far – testify to the readiness to absorb the attendant repercussions of unrestrained political violence.[2] Viewed in unison with the newly formulated Cold Start doctrine, with its emphasis on tactical flexibility, the time remains early for the introduction of an attack medium that is both ubiquitous and efficient.[3] The role of drones as a selective yet no less brutal means of violence thus gains fresh relevance particularly in the wake of the devastating Uri attacks.[4]

On a broad note, a considerably strengthened Indian drone fleet is likely to contribute to stronger Pakistani responses in future disputes. While a surveillance drone deal will likely shift the India-Pakistan balance of power, New Delhi’s endgame is to obtain the Predator-C Avenger armed with Hellfire missiles – which would enable India to conduct pre-emptive, cross-border strikes along its porous borders against potential terrorist threats.[5] Acquiring such a capability would fit within the strategic boundaries established in the Armed Forces Special Powers Act of 1990 . The act legally justifies any ‘use of armed forces’, including that of drones, in territories explicitly classified as ‘disturbed areas’, which is the case of Kashmir.[6]

It is therefore not a stretch to conceptualize the deployment of drones – both lethal and nonlethal – to enforce Kashmiri security, albeit without the regulatory oversight of courts and legislative committees that actively work to define the parameters of drone activity. Coupled with evidence of Pakistani complicity in the Kashmiri insurgency movement,[7] what transpires is a drone platform that may exacerbate the already tenuous strains of low-intensity conflict in the region. Denoted by periodic exchanges of armed violence and border clashes, it remains an unsettling yet imperative task to ponder the dire consequence of an ill-informed drone strike mission – say, a missile that was launched on a location populated both by the suspected target as well as large numbers of civilians. Indian policymakers attracted to the tactical precision of drones will eventually have to be prepared to absorb the attendant strategic perils in an already confrontational atmosphere.

This drone push comes as President Obama wishes to finalize a key facet of US-Indian military cooperation before his successor assumes office. A key challenge, however, is that drones in the Line of Control – the de facto military control line between India and Pakistan – merely adds fuel to the fire. Operator proficiency, which is far from guaranteed, could result in collateral damage or even in-flight crashes. Such incidents, which would likely spark an overreaction from Pakistan, would test the resilience of U.S.-Indian military cooperation but would also open up further discussions for other possible bilateral defense programs.

Concurrently, whilst India’s recent entry into the Missile Technology Control Regime (MTCR) has broadened existing avenues of military technology transfers, it still finds itself in a slight predicament.[8] New Delhi has long been reluctant to sign the accordant foundation agreements, consisting of the LSA (Logistical Support Agreement – currently LEMOA, a diluted version has been ratified), CISMOA (Communication Interoperability and Security Memorandum Agreement) and BECA (Basic Exchange and Cooperation Agreement). While they are not prerequisites for bilateral cooperation with the U.S., they nevertheless expedite rates of interoperability and technology transfers, speeding up drone acquisitions in the process.

There remain a number of additional concerns regarding merits of signing these agreements. Firstly, the LSA requires India to provide access to its bases for U.S. Military Transporters – meaning that it would be compelled to forgo neutrality and strategic autonomy completely in the geopolitical frictions between the U.S. and China. Secondly, BECA would afford the U.S. unrestricted access to Indian intelligence reports and battlefield satellite data imagery whilst CISMOA forbids all Indian personnel from utilizing U.S. military communication devices. In the wake of such crucial diplomatic talks, many Indians have been increasingly concerned over how willing their government is to accept such lopsided and intrusive agreements.

With recently escalating tensions, the Indo-Pakistani dilemma remains crucial for both regional and international hegemons. The 2008 Mumbai attacks, which occurred weeks after the U.S. presidential elections, had dragged the international community into fierce multilateral negotiations to de-escalate the situation. With this in mind, India and its allies must carefully tread their bilateral drone programs as it is sure to have serious implications in the geopolitical future of the region.


Gen Kawasaki is a third year undergraduate at King’s College London. He is the researcher and coordinator for the King’s College London Crisis Simulation that will replicate tensions in the India-Pakistan region this year. LinkedIn: Gen Kawasaki

Chu Kah Leong is a third year undergraduate in the King’s War Studies Department. He recently concluded a year long exchange program in Tokyo, Japan and aspires towards graduate studies in the near future.


Notes:

[1] Sanjeev Miglani. “Update 1-India in talks to buy US Predator drones, has eye on China, Pakistan” Reuters, April 8, 2016. Accessed September 23, 2016. http://www.reuters.com/article/india-usa-drones-idUSL3N17B3YU

[2] Kaz De Jong, Nathan Ford, Saskia van de Kam, Kamalini Lokuge, Silke From, Renate van Galen, Brigg Reilley and Rolf Kleber, “Conflict in the Indian Kashmir Valley I: exposure to violence”, Conflict and Health 2:10 (2008), 2.

[3] Abishek Saksena, “Here’s Why the Indian Army’s New War Doctrine ‘Cold Start’ Is Giving Jitters to the World”, India Times (22 April 2015), accessed 6 October 2016. http://www.indiatimes.com/culture/who-we-are/heres-why-the-indian-army%E2%80%99s-new-war-doctrine- cold-start-is-giving-pakistan-the-jitters-232034.html

[4] Muhammad Daim Fazil, “Responding to Uri Attack: What Are India’s Options?”, The Diplomat (29 September 2016), accessed 8 October 2016. http://thediplomat.com/2016/09/responding-to-uri-attack-what-are-indias-options/

[5] Sanjeev Miglani. “India in talks to buy U.S. Predator drones, has eye on CHina, Pakistan” Reuters, April 11 2016. Accessed September 24, 2016. http://in.reuters.com/article/india-usa-predator-drones-china-pakistan-idINKCN0X51BW

[6] Armed Forces (Jammu and Kashmir) Special Powers Act, 1990 (No. 21 of 1990), Sec. 3.

[7] PTI, “Pakistan Role Behind Violent Protests in Kashmir: MoS PMO”, The Times of India, 11 July 2016, accessed 6 October 2016. http://timesofindia.indiatimes.com/india/Pakistan-role-behind-violent-protests-in-Kashmir-MoS-PMO/articlesh ow/53157261.cms

[8] LDWO, Missile Technology Control Regime. “Report by the MTCR Chair: accession of India to the MTCR” MTCR, June 27, 2016. Accessed September 18, 2016. http://mtcr.info/report-by-the-mtcr-chair-accession-of-india-to-the-mtcr/

Image credit: Public domain photograph from defenseimagery.mil, available at http://www.defenseimagery.mil/imageRetrieve.action?guid=39eddc33aac4199784b181043137d0e6f2c9d301&t=2

Filed Under: Blog Article Tagged With: drones, India, Kashmir, Pakistan

PROXY Capabilities – Proliferation and Patronage: UAV Diffusion as a New Form of Proxy

April 6, 2016 by Rian Whitton

This is the third of a series of articles we will be featuring on Strife in the coming week looking at the role of Proxy Warfare in the 21st century by Series Editor Cheng Lai Ki. Previous articles in the series can be found here.

By: Rian Whitton

dbxfbncxnxc
Source: Russia Today

Though having existed for most of the twentieth century, the improved technological capabilities and increased reconnaissance and lethal capacities of unmanned aerial vehicles (UAV’s) have raised concern about their proliferation. Through analysing developments in China, Iran and non-state actors like Hezbollah, it becomes clear that regulation is not working, and the diffusion of UAV is providing new avenues for proxy strategies.

China –Interstate proliferation a form of arms competition and proxy

Beijing has been researching unmanned aerial vehicles since the late 1950s.[1] More recently, China’s economic boom has fuelled a substantial programme of military modernisation, one of the fruits of which has been the procurement of some 50 designs.  These range from micro-drones to unmanned combat systems (UCAV’s) like the Wing Loong II (Pterodactyl), a platform whose similarities to the MQ-1 Predator led some to believe it was procured through espionage.[2]

While the Chinese rationale for UAV’s relates directly to the patrolling of Beijing’s interests in the contested maritime waters of the South China Sea and East pacific, the most striking development has been the exporting of platforms to other countries.[3] Nigeria, Egypt, the UAE and Saudi Arabia have all purchased the Wing Loong I, with Jordan, a prominent US ally in the fight against IS, also rumoured to have negotiated a deal in May 2015.[4]

A number of factors explain Beijing’s success in selling UAV’s. A recent senate report noted that China was not hindered by the same export restrictions of the two premiere UAV producers; the USA and Israel. While the two countries are bound by the Missile Technology Control Regime (MTCR) and the Wassenaar Arrangement, China is not, and thus has been sheltered from competition with its more renowned competitors.[5]

Another driver is the relatively low cost of Chinese systems. The Wing Loong II is believed to cost $1 million in comparison to the $30 million Reaper.[6] Though it lacks the payload, maximum altitude and speed of its US counterpart, such deficiencies are redundant in a market strategy primarily pandering to developing countries in Africa and the Middle-East. At a 2012 air show in Zhuhai, a Chinese official explained that Asian and African countries were “quite interested in the intermediate and short-range UAVs because they are expendable and low-cost.”[7] China also attempted to capitalise on Pakistani frustration at not accessing US UAV technology by supplying Islamabad with the CH-3 Rainbow.[8] This was averted with the indigenous development of the Burraq UCAV.[9]

Worries about Beijing undercutting Washington in the sale of UAV’s led Republican rep. Duncan Hunter to urge the President to provide the Jordanian government with access to the Predator, in response to concerns that China was finalising a deal with America’s regional ally to supply a number of unmanned platforms.[10] That General Atomics (producer of the Predator) is Hunter’s largest campaign contributor should be noted, and in the face of stagnating domestic budgets, American companies are pushing for ever looser export-restrictions. Concomitantly US-aligned countries like Ukraine have begun requesting Reapers.[11] Washington’s current policy has been to help its allies by using UAV’s to provide lethal targeting information, like with French forces in Mali.[12]

With both internal and external pressure, America has eased its restrictions on exports as of mid-2015.[13]Though still abiding by the MTCR agreements, the development suggests an understanding in Washington that their stringent controls have done nothing to stall proliferation, as they risk losing market ground to China.

Iran- Middle Powers can develop significant UAV industries

The proliferation and control of UAV’s is increasingly out of the hands of great powers, with regional players like Iran developing significant capability.

The international embargoes on Tehran have so far limited it to domestic technology, but the programme; spearheaded by the Revolutionary Guard’s Aerospace division, has made considerable progress off the back of reverse-engineering US/Israeli systems.[14] An example of this is the Shahed-129 (based on the Israeli Hermes-450), which is purported to be capable of a missile payload for a non-stop 24-hour flight over 2000km.[15] Iran has also claimed to develop an air-to-air combat drone (Sarir H-110). The ability of Iran, a regional power under international embargo, to develop a thriving UAV industry primarily through the reverse engineering of Western models is impressive.

The effectiveness of regulation or embargos is unlikely to stall this development. The Iranian drone fleet is comprised mainly of small tactical platforms, and thus the majority of necessary components are accessible via the use of middlemen and front companies. In 2009, a US cable published by WikiLeaks warned about Iran trying to obtain German Limbach 550E engines and ship them to an Iranian Aircraft Manufacturing Company with faked shipping labels.[16] Such accessibility to dual-use components and off-the-shelf materials makes UAV’s a difficult category to regulate compared to more expensive systems (vis-à-vis fighter aircraft). Alarmingly, Iran’s success in procuring modern UAV technology is facilitating the diffusion to non-state proxies.

Hezbollah- Non-state proxies have increased access to UAV’s

One of Iran’s key beneficiaries; Hezbollah, has had access to drone technology for a number of years, with a fleet of reportedly 200 platforms.[17] As early as 2004, Iran ferried an update of the Mohajer, the Mirsad, to Hezbollah.[18]

This has exacerbated security concerns for Israel. In2006, Hezbollah launched Ababil UCAV’s allegedly carrying explosives against Tel Aviv. They were promptly shot down by Israeli F-16s.[19] These medium-altitude UAV’s are virtually defenceless against sophisticated air defences, but the main concern for Tel Aviv is that Hezbollah will use large quantities of low-flying miniature drones that are harder to intercept. An example this came in 2014 when a low altitude reconnaissance drone was caught loitering over an Israeli nuclear reactor.[20]

UAV’s provide Hezbollah with a number of advantages; kamikaze-style strikes could have a similar casualty rate to suicide bombings. The unmanned systems could also supply the group with accurate reconnaissance of Israeli movements while potentially directing a 60,000 strong stockpile of projectiles.[21] The psychological impact is also substantive, with insurgents appearing to strike technological parity with the world’s fourth-strongest military. This constitutes a misappropriation of awe regarding the sophistication and strategic impact of UAV’s.

Iran’s patronage of Hezbollah represents the most striking case-study of UAV’s being used as a tool of proxy warfare by competing powers, and the technology is proliferating on multiple fronts. In the ongoing Ukrainian conflict, reports suggest the Donetsk People’s Republic has deployed the Russian-made Eleron 3SV for ISR (intelligence, surveillance and reconnaissance) campaigns.[22] In turn, Kiev has been using modified and hobbyist UAV’s for ISR support.[23]

Looking forward

The successes of China in undercutting America by exporting cheaper drones, and the ability of Iran, despite embargos, to develop an impressive apparatus and arm its proxies, points to the fact that the stringent US-export controls and wider international regulations are not going to prevent the proliferation of unmanned aerial vehicles.

While the mentioned examples relate to the diffusion of drone technology via state patronage, the economics and feasibility of drones are driving proliferation beyond arms sales.

As Woods notes, non-state actors are trying to build their own UAV’s. In 2013 alone, local law enforcement has uncovered ‘drone workshops’ in three nations.[24] In Iraq and Islamabad, ‘Drone-laboratories’ have been uncovered.[25] As Iran’s procurement through reverse engineering and off-the-shelf purchasing has shown, the acquisition of drone technology is becoming increasingly feasible, so much so that non-state actors may not have to act as a proxy and rely on a generous patron for accessing UAV’s. In 2012, the RAND Corporation study noted the possibility of insurgents and terrorists being armed with substantial fleets of small, rudimentary drones and employing swarm technology.[26] There is certainly no guarantee that even the tightest international regulation of states, or even a ban, would stop terrorist organisations incorporating unmanned systems within their wider arsenals.

Despite these concerns, three considerations should undercut hyperbole regarding the diffusion of UAV’s. Firstly, unmanned systems, though tactically convenient and incorporating multiple capabilities, have yet to prove beyond doubt their strategic war-winning ability.

Second, unmanned systems remain secondary to conventional airpower. During the 2011 intervention in Libya, NATO remote crews carried out 145 strikes, compared to the 7,455 weapons released by manned aircraft.[27] This provides some context of drone usage not as transformative but as a growing development alongside traditional airpower.

Third, the growth in unmanned systems has been mirrored by counter-measures employed by both non-state actors and states. In Mali, a document was discovered which provided practical solutions on how to foil drone strikes.[28] Militants and non-state actors are receiving the military kit, like Russian-made ‘Skygrabber’ transceivers, that can interfere with UAV signals and hack into drone feeds.[29] The Kremlin has also provided its separatist beneficiaries in the Donbass with signal jamming technology.[30] The proliferation of unmanned systems is feeding a simultaneous proliferation of ‘anti-UAV’ technology.

Technologists like Elon Musk have opened a debate on banning autonomous weapons.[31] But when it comes to regulating the systems on which the prophesied artificial intelligence might run, the ship has sailed.

Rian holds a bachelor’s degree in history & politics from the university of Sheffield. He is currently undertaking his MA in science & security at King’s where his academic interests revolve around technological innovation, unmanned systems, remote warfare and strategic culture.

Notes:

[1] O’Gorman, R.  & Abbott, C., ‘Remote control war Unmanned combat air vehicles in China, India, Israel, Iran, Russia and Turkey,’ Remote Control Project, Open Briefing, September 20th, 2013, p. 3 http://remotecontrolproject.org/wp-content/uploads/2014/03/Remote-Control-War.pdf

[2]Baker, B. ‘Chinese Arms Companies Are Picking Up the Pace in Africa and the Middle East,’ The Diplomat, October 21st, 2015   http://thediplomat.com/2015/10/chinese-arms-companies-are-picking-up-the-pace-in-africa-and-the-middle-east/

[3] O’Gorman, R.  & Abbott, C., p. 5

[4] Tucker, P. & Weisgerber, M., ‘China May Be Selling Armed Drones to Jordan,’ Defense One, May 15th, 2015. http://www.defenseone.com/technology/2015/05/china-may-be-selling-armed-drones-jordan/112876/

 [5] Hsu, K., ‘China’s Military Unmanned Aerial Vehicle Industry,‘ U.S.-China Economic and Security Review Commission, June 13, 2013, p. 15 http://origin.www.uscc.gov/sites/default/files/Research/China’s%20Military%20UAV%20Industry_14%20June%202013.pdf

[6] Baker, B., ‘Drone Wars: China and US Compete on the Global UAV Market,’ October 25, 2015 ‘http://thediplomat.com/2015/10/drone-wars-china-and-us-compete-on-the-global-uav-market/

[7] Standaert, M. ‘China unveils new drones aimed at buyers in developing countries,’ Global Post, November 15, 2012, http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/121114/china-unveils-newdrones-developing-economies.

[8] Ali Ehsan, M., ‘Drone warfare in Balochistan,’ The Express Tribune, June 14th, 2015  http://tribune.com.pk/story/903100/drone-warfare-in-balochistan/

 [9] Baghwan, J., ‘Drone war: ‘Burraq’ turned the tide in Tirah battle, say officials,’ The Express Tribune, March 26, 2015, http://tribune.com.pk/story/859152/drone-war-burraq-turned-the-tide-in-tirah-battle-say-officials/

 [10] Tucker, P. & Weisgerber, M.

[11] ‘‘Hostile Drones,’ p. 13

[12] Woods, C., ‘ Sudden Justice, America’s Secret Drone Wars,’ Hurst company, London, 2015, p. 280

[13] Tucker, P. & Weisgerber, M., ‘Obama To Sell Armed Drones To More Countries,’ Defense One, February 17th, 2015 http://www.defenseone.com/technology/2015/02/obama-sell-armed-drones-more-countries/105495/

[14] O’Gorman, R.  & Abbott, C., p. 9

[15] Rawnsley, A., ‘Like It or Not, Iran Is a Drone Power: Sanctions have not stopped Tehran’s robot development,’ War is Boring, September 5th, 2014  https://medium.com/war-is-boring/like-it-or-not-iran-is-a-drone-power-e9899c954a3f#.zcv6do9u5

[16] Rawnsley, A.

[17] ‘Hostile Drones,’ Remote Control project, Open briefing, January 2016, p. 12 http://remotecontrolproject.org/wp-content/uploads/2016/01/Hostile-use-of-drones-report_open-briefing_16.pdf

 [18] Dreazen, Y., The Next Arab-Israeli War Will Be Fought with Drones,’ New Republic, March 27th, 2014 https://newrepublic.com/article/117087/next-arab-israeli-war-will-be-fought-drones

[19] ‘Hostile Drones,’ p. 12

[20] Hostile Drones,’ p. 12

[21] Dreazen, Y.

[22] Dreazen, Y.

[23] ‘Hostile Drones,’ p. 13

[24] Woods, C., p. 275

[25] Woods, C., p. 275

[26] Woods, C., p. 275

[27] Woods, C., p. 279

[28] Woods, C., p. 273

[29] Woods, C., p. 273

[30] Hostile Drones,’ p. 13

[31] Roberts, B. & Musgrave, Z., ‘Why Humans Need To Ban Artificially Intelligent Weapons,’ Defense One, August 14th, 2015 http://www.defenseone.com/technology/2015/08/why-humans-need-ban-artificially-intelligent-weapons/119130/

 

Filed Under: Blog Article Tagged With: China, drones, Hezbollah, Iran, UAV

Is democratic peace theory undermined on the cyber battlefield?

October 30, 2015 by Strife Staff

By: Archie Jobson

https://c1.staticflickr.com/1/427/18729140824_4ae0fb0574_b.jpg
https://c1.staticflickr.com/1/427/18729140824_4ae0fb0574_b.jpg

Remote Control is a project hosted by the London-based think tank Oxford Research Group, set up to examine changes in military engagement, in particular the use of drones, special forces, private military companies and cyber warfare. They recently hosted an essay competition for participants in response to the question ‘Is remote control effective in solving security problems?’ Both Chad Tumelty and Archie Jobson of King’s College London achieved runner up. Strife is proud to feature them as your long read of the week over the coming two weeks.

Democratic peace is a historically proven and appealing solution to the violent and anarchic nature of international relations. However, much of the statistical proof for claims of a democratic peace rest on constrained and narrow definitions of war. Cyberwar introduces a new method of war that negates many of the principles and parameters of democratic peace theory, subsequently putting the validity of a democratic peace in doubt. In order to conclusively assess whether democratic peace is applicable to cyberspace, I shall, firstly, define cyberwar in reference to current debate and the Clausewitzian understanding of war. Secondly I will contrast the characteristics of cyber war to the framework of democratic peace theory. Ultimately democratic peace theory has little applicability to the realm of cyberspace, but, importantly, to date the democratic peace has held, as two democratic states are yet to engage in cyberwar.

“Cyber war will not happen” and “cyber war will happen!” are, two conflicting arguments posed by Thomas Rid and John Stone respectively. Although, as the titles suggest, both are seeking to establish the likelihood of cyber war, the essential disagreement can be seen as does cyberwar constitute war. Thomas Rid claims that, due to the lack violence in a cyber attack it cannot equate to conventional understandings of war, and thus is not. Rid refers to Clausewitz’s definition,  “war is an act of force to compel an enemy to do our will.” The crucial word for Rid is force, which he defines as violence and thus an action of war must pertain an element of lethality. However this seems to be a flawed understanding of war and, as John Stone points out, is historically unfounded. Stone highlights the 1943 bombings of the Bavarian town of Schweinfurt. The intended aim was to destroy German ball-bearing production capacity. Although over 400 civilians died in these raids, providing Rid’s lethality, it was seen as “incidental to the desired goal”. The proposition is that, these air raids had no aim of lethality but were clearly acts of war, and thus Rid’s requirement of lethal violence is restrictive, even by conventional understandings of war. It is possible to reinforce John Stone’s argument with the logic that, if an action of cyberwar results in the “compel(ling)” of an enemy to do the attackers “will” then it arguably constitutes war, at least by a Clausewitzian definition. Essentially, this means that if cyberwar achieves the same result as traditional warfare, it should be considered as war. This is reinforced by the idea that if “breaking and entering” in cyber space, the theft of personal or corporate information, is registered as an equal if not greater crime as physically breaking and entering, then cyberwar that achieves the submission of the opponents will, must equate to a conventional conflict that amounts to the same.

The cyber attacks on Estonia in April 2007 demonstrate this. As the result of the proposed removal of a Soviet war memorial from the centre of Tallinn, Estonia and its online infrastructure came under attack from computers of Russian origin. In context, Estonia was regularly called the “wired state of Europe”, with 90% of its domestic financial transactions taking place online. By May 19th Hansabank, Estonia’s largest bank, was forced offline. Ultimately to stop these attacks the Estonian government was forced to close down all external Internet traffic, essentially shutting itself off to the rest of the world. Although, clearly, this is not a cyberwar between two democracies, it demonstrates that a state can force another to act against its own will, by the use of a cyber attack. In this case Estonia closing itself off to the world, causing significant disruption and economic damage. Estonia’s cyber space was recognized by Russia as integral to the “wired state”, and was targeted for this reason. It is hard to deny, therefore, that cyberwar does not constitute war; if, as this example shows, it has the potential to achieve the same ends desired in a conventional conflict. The retort could be made that the memorial was still removed, demonstrating Estonia did not bow to Russian desires; but this seems naive to the nature of Russian intentions during this period. The attack on Estonia can be seen as a move by Russia to demonstrate its support of ethnic Russian communities in former soviet bloc states, this is highlighted by the 2008 Russo-Georgian war which also involved substantial cyber attacks. However, it should be noted that a cyber war such as this would not fall under the traditional definition of war utilized by democratic peace theory, the “correlates of war.” Thus the distinction should be established that either the correlates of war are outdated and cannot help in understanding the ever modernizing developments of war, or that cyber war does not constitute as a sufficient example of conflict; it seems on assessment of the above example the later is incorrect.

The logic of democratic peace theory prescribes that democracies do not engage one another in military conflict, due to the nature of democratic systems and the shared cultural norms that reject violence. Cyber warfare introduces several new elements that null these factors, and in so doing raise questions of the validity of democratic peace theory. Democratic peace theory posits that the absence of war between democratic states is a result of “institutional constraints; the restraining effect of public opinion or of the checks and balances embedded in the democratic structures.” In cyber warfare, however, the dynamics of conflict have fundamentally changed, negating these explanations. For example the battlefield of cyber war is not inhabited by soldiers but by servers. This subsequently removes the danger to life, and thus it must remove a strong element of public aversion to conflict. Secondly if the conventional elements of war are either removed entirely, or substantially reduced, it will be accompanied by a significant cost reduction. Thus if a nation will not loose “its treasure” (comparatively to conventional war), and there still remains the possibility of gain from a cyber conflict, in the form of prestige or a stronger global position; the assumption that democracies would be unwilling to commit to a conflict, lacks evidence. Ultimately, if “blood and treasure” were not applicable there would be little, if no, restraining effect. This is because these are two, fundamental, war retardants held by democratic peace theorists.

Christopher Layne points out that democratic peace theorist often argue “that the absence of war between democracies is more important than the absence of threats”. The validity of this argument, as a result of the weaknesses highlighted above, is now under much greater pressure. Democratic states can now threaten another international actor with cyberwar, without the restraints they were contained by before. The comparatively smaller cost of a cyber attack, in terms of “Blood” and “Treasure”, to a conventional one is demonstrated by “struxnet”. This was a virus, planted by the US, which infected the Iranian nuclear facilities’ computer network. This caused an internal explosion by disrupting the separation process of uranium-235. The conventional alternative, that could have caused the same level of damage, would have been an airstrike using special munitions, with estimate costs running into millions of dollars. Struxnet was cheap as it “capitalized on code expertise” that already existed. Furthermore no US personnel were put at risk to carry out the operation. Cyberwar thus challenges the assertion that substantial physical and economic loss prevents elected leaders from taking their countries to war with other democratic states. This is because the weight of public antipathy to these loses, is essentially non-applicable in cyberwar; rebuffing the claims that war will not happen between democratic states.

The transparency and legality of democratic states is also claimed by democratic peace theorist to demonstrate why democratic states are less likely to engage in conflict. As a result of this transparency and conformity to international legal norms it is argued that, democratic states have an innate level of trust amongst each other. However, in the cyber world such faith in another states intentions, especially those towards you, is challenged. This is due to the element of deniability that is possible with cyber attacks, that is not possible via conventional methods. For example, operation “Titan Rain”, as dubbed by the US, was a wide spread cyber attack on multiple US and UK government departments from 2003-07, that came from Chinese origin. The blame was put solely on PLA by British and American government officials; yet the Chinese government was able to plainly deny these claims due to the attacks untraceable nature. Although again this example is not a conflict between two democracies, it clearly shows that transparency and legality do not apply in cyber space. This is because a state could perpetrate an attack to disable a government’s infrastructure, an act that fulfils the parameters of war, but then deny any involvement. As Chinese government did by arguing they had no part in the attack. Crucially America and the UK were restricted in their response on these grounds, and could not pursue a legal course. Therefore, because the burden of proof in the cyber world is so much greater it could fog up the transparency of democratic states and thus trust in one another would dissipate. Cyberspace is therefore a domain in which, a state could attack another and not be held accountable to international legal norms. The situation has arisen where transparency and conformity to legal norms are no longer relevant, because states can act essentially anonymously. Ultimately, this will challenge democracies’ commitment to international law.

Maoz and Russet in “A Statistical Artifact?” state that democratic spirit of “peaceful competition, persuasion and compromise” explains why democracies behave in a “qualatively” different manner towards each other than they do towards non-democracies. As the cyber world continues to develop this idea of peaceful competition, on which democratic peace’s foundations lie, is increasingly challenged. As a result it is possible to conclude that the apparent stability of democratic peace is not foreseeable. This can be demonstrated by the comparison of the 1923 Ruhr crisis with the 2013 United States National Security Agency’s espionage on the state owned Brazilian oil giant Petrobras. Historically the idea that democracies behave towards one another with a mutual respect has been regularly challenged. Christopher Layne in “Kant or Can’t: The Myth of the Democratic Peace” challenged such arguments with the example of the 1923 Franco-German Ruhr Crisis. Essentially Layne claims that, the occupation of the Ruhr valley by France is an example where the inherent respect that democracies have for one another, was not present. The occupation of the Ruhr showed that France’s war objective of crippling Wilhelm Germany remained the same, despite the fact that Germany was now a democratic republic. Up to 1923 France had rejected the idea of a new democratic Germany, as they did not believe their security situation had fundamentally changed. “What mattered to France was Germany’s latent power”, France’s attitude toward Germany “displayed none of the mutual respect based on democratic norms and culture” on which democratic peace theory rests. As a consequence the French PM Poincare had no option, if he was to maintain his prime ministerial position, but to occupy the Ruhr as anti-German sentiment was so high in France. The Ruhr crisis provides two problematic situations for democratic peace theorists.  Firstly it demonstrates that, should it be politically expedient for one democracy to force itself upon another, as it was for Poincare, it will. Secondly, and more importantly for cyber war, when the situation arises that one democracy is inherently weaker than another (Germany 1923) then it becomes a viable target for other democracies. This is arguably the current situation in cyber space and consequently the cyber battlefield.

In September 2013 it emerged that the U.S had been spying on the Brazilian oil company Petrobras. This provides many parallels to 1923 and is essentially an act of corporate cyber espionage by the U.S, against a state owned oil producer. From this it is possible to conclude that the United States, in a similar fashion to France in 1923, does not conform to ideas of mutual respect; instead they sought to understand the “Latent” economic power of Petrobras, and thus the Brazilian government’s oil wealth. At this point it is important to acknowledge Moaz and Russet’s claim that democratic peace is generated by “peaceful competition, persuasion and compromise”, thus the stability of the so called democratic peace, if Moaz and Russet are correct, is on unstable ground, as a result of an increasing turn to the realm of cyber space. The Petrobras incident demonstrates that in cyber space two essential pillars of democratic peace have been removed. This is because the United States has shown that democratic states do not have the inherent respect required of democratic peace theory, when they are operating in the cyber world. Furthermore on the evidence presented it is possible to conclude, if not predict, that democracies such as the U.S would be willing to perform a cyber attack if it enabled some kind of economic benefit. Therefore the growth of the cyber world has simultaneously eliminated the idea of trust between democracies. As a result the likelihood of (cyber)war is much greater.

The counter argument could be made here that Petrobras, despite its majority state ownership, does not amount to a democratic state, hence this example does not undermine democratic peace theory’s requisite that democracies hold mutual respect and compete peacefully. However this is one example of many. If, for example, you examine 2013-14 revelations that the CIA and NSA were exercising a “Special Collections Service”(SCS) unit in Berlin monitoring not only Angela Merkel’s phone conversations, but also the committee rooms of the Reichstag, the future for democratic peace in the cyber realm is bleak. This example demonstrates that not only do democracies not inherently trust democratically elected leaders, but also the legislative bodies within democratic states. Moreover the SCS program has been in operation across Europe operating in other capitals such as Madrid. What this demonstrates, is that if a democratic state has the ability to do something, as the U.S cyber dominance has allowed in this case, it will do it. Furthermore it demonstrates that it will not be restrained by the articulated parameters of democratic peace theory.

Cyberwar presents a decisive challenge to democratic peace theory. The developing nature of warfare allows the logic of the democratic peace to be disputed. This is because cyberwar is not restricted by the confinements of public opinion, this in turn defeats ideas of transparency and trust between democracies. However, as stated, an example of cyberwar, that in itself, disproves the democratic peace cannot be provided; only examples that indicate the likelihood of future cyberwars between democracies. When two democratic states come into collision on an issue divisive enough for them to question the trust on which democratic peace is orientated, the inherent harmony of democracies will collapse. This is beginning to emerge as the U.S utilizes its cyber hegemony to infiltrate other democratic states, in order to understand their intentions, and true capabilities. What cyberwar reinforces, therefore, is that democracy is still in its founding moments and to conclude that it will create a perpetual peace, is to ignore the possibility of development in what we define as peace and war.

Archie is currently a third year undergraduate in the War Studies Department at King’s College London. His dissertation focused on human rights and the war on terror. He is interested in the changing nature of warfare and how it is revealing our rigid definitions of conflict as inadequate and outdated. Archie is hoping to continue his studies within the War Studies Department with an MA in Terrorism, Security and Society.

Filed Under: Blog Article Tagged With: Cyberwar, democracy, Democratic Peace, drones, Petrobras, UK, USA

Is remote control effective in solving security problems?

October 20, 2015 by Strife Staff

By: Chad Daniel Tumelty

https://upload.wikimedia.org/wikipedia/commons/8/89/MQ-9_Reaper_UAV.jpg
https://upload.wikimedia.org/wikipedia/commons/8/89/MQ-9_Reaper_UAV.jpg

Editors note: Remote Control is a project hosted by the London-based think tank Oxford Research Group, set up to examine changes in military engagement, in particular the use of drones, special forces, private military companies and cyber warfare. They recently hosted an essay competition for participants in response to the question ‘Is remote control effective in solving security problems?’ Both Chad Tumelty and Archie Jobson of King’s College London achieved runner up. Strife is proud to feature them as your long read of the week over the coming two weeks.

* * *

Drones manifest both the concept and operation of remote control. As more states acquire and use drones to perform tasks previously performed by manned aircraft the effect that this transition of control will have upon wider state security will become clear. However as yet it is not. As such it is important to not only to think about how effective drones may be in solving security problems but also the wider impact this may have. The argument presented here is that the effectiveness of drones in solving state security problems will not be determined by the technology that allows them to be controlled remotely but in how states utilise that technology without impacting upon the security of other states. While drones can increase a state’s security by performing sorties that manned aircraft cannot, offering unparalleled persistence over borders and maritime interests, in areas where relations between states are strained such employment may be misperceived and create a security dilemma. Although drones enable states to conduct dangerous reconnaissance flights remotely without any risk to a pilot, epitomizing the concept of post-heroic warfare, this risks states becoming more inclined to conduct more politically precarious operations, potentially eroding security.

 

Introduction

Drones represent the perfect manifestation of both the concept and operation of remote control in technological form. The growing ubiquity and employment of drones represents one of the most salient technological developments to impact upon state security in recent times. Both the number of states acquiring drones as well as the number and variety they are acquiring is growing; with over ninety states now operating them, and a further twenty actively developing them.[2] Commonly referred to as unmanned aerial vehicles (UAVs), or more accurately remotely piloted aircraft (RPA), drones allow states to exercise many of the same operations performed by manned aircraft through systems of remote control, sometimes at greater efficiently or at lower risk. Although certain elements of some drones operations are automated, such as take-off and landing, they are often confused as being autonomous systems; ones that can perform a task or function without human input once activated.[3] While drones are being increasing used to perform security tasks instead of manned aircraft, the effect that this transition to remote control will have upon on state security is not yet clear.

The current U.S. exceptional use of armed UAVs to conduct targeted killings of suspected terrorists and insurgents outside of traditional battlefields, such as in Pakistan, Somalia and Yemen, by President Obama’s administration has raised both the profile and controversy surrounding drones.[4] Despite this, even before the first armed General Atomics MQ-1 Predator was tested in 2001 the use of drones was a growing feature of state security activity in non-lethal intelligence, surveillance and reconnaissance (ISR) roles; such as the American use of such systems in the Gulf War and operations in Bosnia and Kosovo, as well as frequent Israeli deployment of drones since the 1980’s.[5]  Historically drones have been operated as such intelligence gathering platforms, most notably by the U.S. National Reconnaissance Office (NRO) throughout the Cold War.[6] Outside of military and intelligence applications, drones are now also being used for a variety of non-lethal ISR roles by both state and non-state actors, including counter-trafficking surveillance, border patrols, search and rescue operations, and environmental monitoring, while it is as widely considered that drones have the potential to be used in almost ‘endless’ commercial applications.[7] Many also view the limited use of UAVs by Hezbollah as the possible prelude to their widespread use by other terrorist groups.[8] Given their proliferation, it is important to understand how effective the use of remotely controlled drones will be in solving a state’s security problems but also to consider the wider impact this may have upon their security.

The impact that drones will have upon security will not be determined by the technology behind making an aircraft unmanned but on how states utilise the remote control that drones offer and how other states will react to this in turn. In order to evaluate how effective remote control is in solving security problems this essay will explore the employment of drones by states to perform security functions associated with ISR applications. It will argue that while the uses drones in such roles may increase a state’s security in a number of ways by performing onerous functions that manned aircraft cannot, the perceived low risk to their employment may potentially erode security however by increasing the inclination of states to undertake more intrusive operations against others, both politically and physically, which they would not do with manned aircraft. In order to illustrate this, this essay will consider both the ‘dull’ surveillance and ‘dangerous’ reconnaissance tasks that drones are commonly conceived as being especially suited for, as reflected in both British and American doctrines on RPA.[9] The first section will consider how by performing surveillance flights previously considered too dull for manned aircraft the remote control offered by drones can effectively increase a state’s security by enabling persistent loitering over borders, waters and other national interests, and then consider the potential impact this may have in creating a security dilemma. The second section will explore the issue of greater concern and the use of drones to conduct dangerous reconnaissance and intelligence gathering missions over an adversaries territory, and how this risks creating insecurity between states through this post-heroic use of airpower.

Dull Surveillance

It is often the limits of human endurance that constitutes the weak link in the time that an aircraft can remain airborne. Occasionally exceptional efforts have been made to overcome these limitations, such as during the Kosovo intervention when American Northrop Grumman B-2 Spirit bombers flew with two crews on-board during their thirty hour roundtrip missions from their base in the continental U.S. to Serbia.[10] However pilot fatigue has mainly been the constraining factor of flight-times and not aeronautical engineering. By removing the manned element in the aircraft drones ameliorate this issue through remote control and allow for missions requiring significant endurance that have been previously classified as either too dull or difficult to be flown. For example, the Northrop Grumman RQ-4 Global Hawk, often suggested in the U.S. as a replacement for their Lockheed U-2 spy plane, nicknamed the ‘Dragon Lady’, is able remain airborne in excess of thirty hours over long ranges but can operate either through automation on preprogramed flight paths or by pilots working in shifts through remote control, negating the constraint of fatigue.[11] Drones then, as put by former Royal Air Force Air Chief Marshal Sir Brian Burridge, enable the ‘holy grail of air power: persistence’ which in turn opens up new ways in which such aircraft can be utilised to increase state security enabled through remote control.[12]

It is through this persistence that drones offer states which confers upon them the ability to improve their security situation by increasing the protection of previously vulnerable areas or assets through extended surveillance. RPA are commonly referenced by many as a suitable solution to protecting and monitoring ‘vulnerable targets at sea’, such as merchant shipping, tankers, oil rigs and pipelines, through the exploitation of the persistence offered by remote control.[13] The British vision for drones primarily involves them undertaking many maritime security tasks, that are either not suited to naval assets or that are currently performed by manned aircraft but require multiple sorties; such tasks include littoral monitoring, anti-submarine patrols, counter-piracy tasks, fisheries protection and ocean scanning.[14]  Both the U.S. Coast Guard and Navy already employ a number of UAVs to conduct these tasks.[15] Drones can also increase a state’s terrestrial security by performing dull flights. In 2005, the U.S. Congress authorized its Customs and Border Protection to purchase unarmed Predators to conduct its border patrols and surveillance more effectively and easily.[16] Since then a number of other federal agencies including the Missile Defense Agency, Drug Enforcement Administration and Department of Transport, as well as growing number of local sheriff and police departments, have acquired a multitude of drones for the purpose of increasing U.S. national security.[17]

By offering the ability to perform flights previously considered too dull, laborious or costly drones can effectively increase a state’s security. The persistent ISR capability that drones offer through remote control at decreased manpower and aircraft fatigue means that previously vulnerable assets or exploitable areas can now be protected. For example, during initial operations in Afghanistan the U.S. Air Force was able to operate twenty four separate Predator missions to provide ‘coverage round the clock’ in supporting troops; a task that would have proven extremely demanding on both aircraft and personnel if attempted with manned assets.[18]  This capability can be easily adapted to increase national security or protect national interests. It should be noted that such operations do come at a high cost however, meaning that not all states could afford to mount such operations and most could not do so over multiple areas at once. A single Predator for example costs a little under $4.5 million, of which a quarter accounts for just the surveillance package, while it requires 168 people working across multiple areas to operate one for, and maintain it after, just twenty four hours of flight.[19] As developments in UAV technology continue to advance and market dynamics ensue it is likely that more advanced drones will be become widely available. It should be noted that not every state will require expensive high altitude, long endurance UAVs such as the Global Hawk or Predator, and will be able to adapt the wide variety of cheaper commercially available drones to meet their own unique security needs. The growing sophistication of drones costing even hundreds of dollars means that they have the potential capacity to produce significant security effects if sophistically deployed.[20]

The use of RPA in such dull surveillance roles may have unforeseen consequences however. Widespread state use of drones on interstate borders and over common waters may invoke a ‘security dilemma’; where steps taken by one state to increase their security undermines the security of other states.[21] When outlining the dilemma in 1978, Robert Jervis noted that ‘inspection devices can ameliorate the security dilemma’ by providing states with a ‘warning of coming dangers’ over their border and waters, but warned that; ‘attempts to establish buffer zones can alarm others who have stakes there, who fear that undesirable precedents will be set, or who believe that their own vulnerability will be increased.’[22] It is through such employment that drones have the potential to create security problems for states. Although the widespread use of drones by various U.S. federal agencies over its shared borders has not concerned either Mexico or Canada this is jointly due to the historical norms of friendly relations between the U.S. and its neighbours and the bi-lateral security benefits of their border protection, ballistic missile defence and counter-narcotics missions.[23]  In regions where there are contested territorial disputes, such as the South China Sea, or where relationships between neighbours are particularly strained or actively hostile, then the introduction of similar practices with drones may increase tension between states.  For example, despite repeated calls to do so the U.S. has refused to provide even unarmed UAVs to Ukraine to perform ISR roles, fearing that it might antagonise Russia further and prompt an escalation in the use of force.[24]

A way of evaluating this potential effect of such security operations with drones is through the lens of the offense-defence balance. This theory suggests that when it is technologically easier for a state to mount offensive action there is a greater probability of conflict, but when defence has the advantage the reverse is true.[25] Therefore if drones are seen as an enabler of territorial conquest and annexation then their widespread use over international boundaries and waters may induce friction between states, however if they are perceived as performing a security function then they could reduce the potential for conflict.[26] While it is difficult to classify technology as either offensive or defensive, Jack Levy has argued that some characteristics such as mobility will inherently offer greater offensive potential than others, such as armament, protection, endurance or even striking power.[27] On a similar vein, recently Peter Singer has noted how emerging technologies such as drones and robotics ‘are perceived as helping the offensive side in a war more than defence’ due to their ability to be operated remotely.[28] Although a fierce critic of the use of drones to conduct targeted killing operations, General Stanley McChrystal has reported how RPA employed in ISR roles were an effective force multiplier for the U.S. Joint Special Operations Command when he led them in Iraq, in that they provided unparalleled situational awareness and improved command and control which enabled his forces to conduct multiple commando raids per night.[29] Therefore there is the potential that drones could produce friction between states when performing surveillance security tasks over shared areas or borders, regardless of their armament, due to the inherent quality of some of their traits, including remote control, in enabling states to conduct offensive operations.

Dangerous Reconnaissance

Reconnaissance flights over an adversary’s territory have historically been the most dangerous mission undertaken by aircraft.[30]  The recent downing and subsequent execution of Jordanian pilot Lieutenant Muadh al-Kasasbeh at the hands of Islamic State and Iraq and the Levant over Syria on the 24th December 2014 illustrates the danger that ISR sorties over an enemy’s territory can entail.[31]  In addition to the risk to a pilot’s life reconnaissance flights have also carried the most political risk.  On the 1st May 1960 the Soviet Union shot down an American U-2 flying over its territory, captured its pilot Major Gary Powers, and then proceeded to arrest him for spying and paraded him on television, causing ‘a devastating blow to the U.S.’s international prestige’.[32] The ensuing political fallout meant that American manned reconnaissance flights over the Soviet Union ceased; ‘What had been an acceptable risk on 1 May became unacceptable politically and militarily on 2 May.’[33]  It was these very risks that drones helped to eliminate through remote control.  As previously noted, it has been in the ISR role over hostile territory that drones have historically been employed. For example, drones were extensively employed to monitor China’s nuclear program and throughout the Cold War the NRO flew numerous drone reconnaissance sorties over the Chinese nuclear test site at Lop Nor to gain details of their nuclear testing and arsenal.[34] On the 15th November 1964 China shot down a U.S. Ryan AQM-34 Firebee in an event which ‘made the front page of The New York Times, but created little controversy.’[35] The loss of seven more drones over China between 1965 and 1975 ‘went virtually unnoticed’ with these events creating almost no political fallout despite conducting essentially the same activity that Powers had been over the Soviet Union.[36]  It is due to this record that Ann Rogers and John Hill argue that drones solve what they term the ‘Gary Powers problem’ simply by being unmanned and remotely controlled, appearing to ‘manifest a less obvious trespass than a manned incursion’.[37]  It is this perception of drone reconnaissance flights that may potentially carry with it the greatest risks to state security.

The fact that drones are piloted remotely means that the calculation of risk concerning their employment for dangerous flights such as reconnaissance sorties is altered. In other words, drones allow leaders to ‘take risks’ that they would ‘hesitate to do with manned aircraft’.[38] The legacy of RPA use throughout the Cold War as well as their current employment stands testament to this. David Dunn argues that because they are controlled remotely and therefore disembodied, drones ‘disrupt the calculus of risk’ in those who employ them by convincing them that their use in sensitive mission can be conducted with ‘domestic political impunity, minimal international response and low political risk’.[39] Peter Singer terms this the ‘dark irony’ of drones, in that by removing the potential risk of the loss of life related to dangerous missions through remote control drones ‘may seduce us into more wars’ by making it more likely that leaders would employ them.[40] The recent Birmingham Policy Commission report on drones stated that it found such arguments of drones ‘lowering the threshold to the use of force’, as they are unmanned and controlled remotely, unconvincing based on the evidence they heard.[41] It should be noted that this was only in a British context however, and this perception of drones may indeed invoke such reckless use by other states. In a 2011 doctrine publication on drones  the U.K.’s Ministry of Defence stated that; ‘an opponent that succeeds in shooting down an unmanned aircraft has little to show for it but some wreckage – which they can easily be accused of fabricating, or for which ownership can simply be denied’. [42] This illustrates that, contrary to the Birmingham Policy Commission’s findings, there may be some within British policy making circles that disregard the risk of drone employment on sensitive reconnaissance missions.

The view that drones may increase the risk of confrontation between states by presenting no risk to a pilot’s life is tied to the idea of post-heroic warfare. Coined by Edward Luttwak, post-heroic warfare describes a condition where force may be employed easily and without restraint by states provided that doing so carries no risk of casualties, enabled by the full exploitation of technologies which remove humans from harm.[43]  It is frequently noted that for many states; ‘It is becoming harder to envision sending manned reconnaissance assets into denied, hostile airspace’, due to the casualty aversion of their societies.[44] Drones solve this issue through remote control by offering leaders the ‘seductive’ ability to conduct dangerous missions without risking the sacrifice or political blowback entailed with manned aircraft.[45] In this way drones therefore embody the concept of post-heroic warfare. Peter Singer notes that; ‘By removing warriors completely from risk and fear, unmanned systems create the first complete break in the ancient connection that defines warriors and their soldierly values.’[46] The effects of this separation are not yet clear, but the wider employment of drones by many states would appear to clarify that it has changed the perception of risk in conducting dangerous or politically sensitive missions. Examples of this have already been seen with Israel’s extensive use of drones to gather targeting information and intelligence over Syria, or more recently Russia’s use of unarmed UAVs over Ukraine to support the separatists with artillery observation.[47]

Although there is some suggestion that states currently appear to view drone reconnaissance sorties as unobtrusive events politically, as these systems become more widely utilised by a greater number of actors this norm could become eroded. The Birmingham Policy Commission noted that many states are beginning to recognise that their air defence posture is unsuitable for drones and are already pursuing research and development projects into anti-drone defences in order to remedy this, indicating that this shift in norms may already be taking place.[48] For example, while current U.S. air defences can defeat a wide range of aerial threats a significant gap exists in that low flying, small UAVs cannot be detected by their ground based radar arrays, meaning that such drones could easily penetrate their airspace.[49] This is related to the offense-defence balance. Although the characteristics of drone technology may make it inherently suited to offense, the balance is also about the relative resources that a state must invest in their own defences in order to counter an opponent’s offensive capabilities; ‘When a technological innovation changes the relative costs of offensive and defensive capabilities, the offense-defense balance shifts.’[50] As most states do not possess the necessary means to counter the wide array of RPA that exist the continued proliferation of drones and their use in the air space of other sovereign state may upset the offense-defence balance. This issue may become more prominent as technical developments continue to make stealth technology cheaper and more widely available.[51] If this occurs then drones flying dangerous reconnaissance missions could destabilise relations between states, potentially leading to a security dilemma. This could be particularly perilous during periods of increased tension between states. A prominent example of this was on the 27th October 1962 when an American U-2 was shot down conducting reconnaissance over Cuba at the height of the Missile Crisis in an event that heightened tensions between the U.S. and the Soviet Union, and almost induced miscalculation at a period when the potential of a nuclear exchange was very real.[52]

Conclusion

In conclusion, while drones may be effective in solving some state security problems this may come at considerable political cost that will have a profound impact on wider state security, the effects of which are not yet clear. Drones can increase state security by performing surveillance sorties that manned aircraft cannot by offering the persistence needed to protect national borders, waters and other national security interests through remote control. In areas where relations between states are strained however such employment may be misperceived under the security dilemma. By enabling states to conduct dangerous reconnaissance flights remotely without any risk to a pilot, epitomizing the concept of post-heroic warfare, drones create a perception of low risk to their employment which may potentially increasing the inclination of leaders to take risks. This carries with it the risk that states will be more inclined to conduct more politically and physically intrusive operations that will erode relations between states impacting security. The effectiveness of drones in solving security problems will not be determined by the technology that allows an unmanned aircraft to be controlled remotely but upon how norms of use are developed over time as to how states can utilise that technology to solve their security problems without impacting upon the security of another state.

Chad is currently studying for an MA in Science and Security at King’s College London. He is writing his dissertation on the bulk collection of metadata by the U.S. National Security Agency. Previously Chad completed a BA in War Studies, also at King’s College London, for which he was awarded a first class honours. He is currently interning at Realeyes, a tech start-up, which provides facial coding and emotions analytical services to brands, advertising agencies and media companies.

[1] An earlier version of this essay was submitted in partial requirement for the postgraduate module “Current Issues in Science and Security”, at the Department of War Studies, King’s College London, on the 25th March 2015.

[2] Kelley Sayler (2015), A World of Proliferated Drones: A Technology Primer, (Washington, D.C.: Center for a New American Security), p. 8

[3] Paul Scharre (2015), Between a Roomba and a Terminator: What is Autonomy?, War On The Rocks, http://warontherocks.com/2015/02/between-a-roomba-and-a-terminator-what-is-autonomy/ , 18/02/2015

[4] Kenneth Anderson (2010), Rise of the Drones: Unmanned Systems and the Future of War,  testimony submitted to the  U.S. House of Representatives Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, (23rd March 2010), p. 1

[5] Air Chief Marshall Sir Brian Burridge (2003), UAVs and the dawn of post-modern warfare: A perspective on recent operations, The RUSI Journal, (148:5, pp. 18-23), p. 18

[6] Thomas P. Ehrhard (2010), Air Force UAVs: The Secret History, (Washington, D.C.: Mitchell Institute Press), pp. 2-5

[7] Medea Benjamin (2013), Drone Warfare: Killing By Remote Control, (London: Verso), p. 15

[8] Brian A. Jackson & David R. Frelinger (2009), Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats to Worry About?, (Santa Monica: RAND Corporation), p. 7

[9] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, (Washington, D.C.: Department of Defense), p. 1; and, Joint Doctrine Note 2/11(2011), The UK Approach to Unmanned Aircraft Systems, (Shivernham: Ministry of Defence), p. 3-4

[10] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, p. 2

[11] Richard A. Best Jr. & Christopher Bolkcom (2000), Airborne Intelligence, Surveillance & Reconnaissance (ISR): The U-2 Aircraft and Global Hawk UAV Programs, (Washington, D.C.: Congressional Research Service), p. 2

[12] Air Chief Marshall Sir Brian Burridge (2005), Post-Modern Warfighting with Unmanned Vehicle Systems: Esoteric Chimera or Essential Capability?, The RUSI Journal, (150:5, pp. 20-23), p. 20

[13] Peter W. Singer (2009), Wired For War: The Robotics Revolution and Conflict in the Twenty-first Century, (London: Penguin), p. 227

[14] Joint Doctrine Note 2/11(2011), The UK Approach to Unmanned Aircraft Systems, p. 3-4

[15] Jeremiah Gertler (2012), U.S. Unmanned Aerial Systems, (Washington, D.C.: Congressional Research Service), p. 23

[16] Benjamin (2013), Drone Warfare, p. 75

[17] Gertler (2012), U.S. Unmanned Aerial Systems, p. 23

[18] John D. Blom (2010), Unmanned Aerial Systems: A Historical Perspective, (Fort Leavenworth: Combat Studies Institute Press), p. 108; and, Singer (2009), Wired For War, p. 33

[20] Sayler (2015), A World of Proliferated Drones, p. 29

[21] Robert Jervis (1978), Cooperation Under The Security Dilemma, World Politics, (30:2, pp. 167-214), p. 169

[22] Ibid, pp. 169-181

[23] Benjamin (2013), Drone Warfare, p. 75

[24] Adam Rawnsley (2015), Ukraine Scrambles For UAVs, But Russian Drones Own The Sky, War Is Boring, https://medium.com/war-is-boring/ukraine-scrambles-for-uavs-but-russian-drones-own-the-skies-74f5007183a2, 20/02/2015

[25] Sean M. Lynn-Jones (1995), Offense-Defense Theory And Its Critics, Security Studies, (4:4, pp. 660-691), p. 661

[26] Jack S. Levy (1984), The Offensive/Defensive Balance Theory of Military Technology: A Theoretical and Historical Analysis, International Studies Quarterly, (28:2, pp. 219-238), p. 223

[27] Ibid, p. 225

[28] Singer (2009), Wired For War, pp. 321-332

[29] Gideon Rose (2013), Generation Kill: A Conversation with Stanley McChrystal, Foreign Affairs, (92:2 , pp.2-8), pp. 4-5

[30] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, p. 2

[31] Martin Chulov & Shiv Malik (2015), Isis video shows Jordanian hostage being burned to death, The Guardian, http://www.theguardian.com/world/2015/feb/03/isis-video-jordanian-hostage-burdning-death-muadh-al-kasabeh, 04/02/2015

[32] Major Christopher A. James (1997), Unmanned Aerial Vehicles (UAVs): An Assessment of Historical Operations and Future Possibilities, (Montgomery: Air Command and Staff College), p. 3

[33] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, p. 2

[34] Ehrhard (2010), Air Force UAVs, pp. 9-10

[35] Ibid.

[36] Office of the Secretary of Defense (2005), Unmanned Aircraft Systems Roadmap 2005-2030, p. 2

[37] Ann Rogers & John Hill (2014), Unmanned: Drone Warfare and Global Security, (London: Pluto Press), p. 2

[38] Lynn E. Davis, Michael J. McNemey, James Chow, James, Thomas Hamilton, Sarah Harding & Daniel Byman (2014), Armed and Dangerous? UAVs and U.S. Security, (Santa Monica: RAND Corporation), p. 11

[39] David H. Dunn (2013), Drones: disembodied aerial warfare and the unarticulated threat, International Affairs, (89:5, pp. 1237-1246), p. 1238

[40] Singer (2009), Wired For War, p. 322

[41] Birmingham Policy Commission Report (2014), The Security Impact of Drones: Challenges and Opportunities for the UK, (Birmingham: University of Birmingham), p. 59

[42] Joint Doctrine Note 2/11 (2011), The UK Approach to Unmanned Aircraft Systems, p. 3-7

[43] Edward N. Luttwak (1995), Toward Post-Heroic Warfare, Foreign Affairs, (74:3, pp. 109-122), p.112

[44] James (1997), Unmanned Aerial Vehicles (UAVs), p. 55

[45] Singer (2009), Wired For War, p. 321

[46] Ibid, p. 332

[47] Patrick Tucker (2015), In Ukraine, Tomorrow’s Drone War Is Alive Today, Defense One, http://www.defenseone.com/technology/2015/03/ukraine-tomorrows-drone-war-alive-today/107085/, 09/03/2015

[48] Birmingham Policy Commission Report (2014), The Security Impact of Drones, p. 29

[49] Davis et al. (2014), Armed and Dangerous?, pp. 4-6

[50] Lynn-Jones (1995), Offense-Defense Theory And Its Critics, p. 667

[51] Davis et al. (2014), Armed and Dangerous?, p. 4

[52] Rogers & Hill (2014), Unmanned, p. 21

Filed Under: Long read Tagged With: Afghanistan, drones, Predator, Reaper, security, surveillance, UAV

Hezbollah in Syria: a game of high stakes

June 19, 2015 by Strife Staff

By Kitty Veress:

000_Nic6455785-e1432745822842-635x357
Hezbollah members mourn during the funeral of a comrade who was killed in combat alongside Syrian government forces in the Qalamoun region. Photo: Times of Israel (published under fair use policy for intellectual non-commercial purposes)

The Western world has been quick to label Hezbollah’s involvement in Syria and Iraq as nefarious and threatening while failing to consider the wider strategic implications. A more comprehensive perspective is needed to evaluate the risks and opportunities the extremist Shi’ite group faces in its support of the Syrian regime. The potential benefit of establishing itself as a regional power and battle-hardening its troops needs to be weighed against Hezbollah’s risk of physical and ideological overexpansion that might expose the group’s vulnerabilities and ultimately endanger Lebanon’s defence capabilities.

Hezbollah

Created in 1982, Hezbollah was originally a resistance group against the Israeli occupation in Lebanon. Since then it has become a prolific global terrorist organisation that has proven its ability to attack anywhere in the world through a wide network of cells. Hezbollah has adapted to domestic and regional dynamics, asserted its position by strengthening its grip on Lebanese politics, and expanded its military influence in the region. The extremist group remains a strong political player with an ability to paralyze Lebanese political institutions and obstruct the appointment of key positions.

Thanks to its state-sponsor Iran, Hezbollah has grown into the strongest military force in Lebanon, with its own division of Unmanned Aerial Vehicles (UAVs) and a breadth and variety of both short and long-range military-grade weapons, such as Syrian Scud-D missiles, that can reach deep into Israeli territory. The group’s involvement in regional crises in Syria, Iraq and Yemen marks an ideological and tactical shift towards regional power that renews the threat to American interests and to their allies in the Middle East.

The regional footprint

Hezbollah’s engagement in Syria is not based on rash decision-making but is rather a sign of the trademark methodical approach that has ensured the group’s survival over more than three decades. Openly operating in Syria since 2013, Hezbollah assists the Assad regime and wages what is essentially a counterinsurgency campaign against inferior enemy rebel factions. In response to ISIS’ territorial expansion, Hezbollah also sent troops to Iraq in early 2015 to back local Shi’ite militias leading the fight against the Sunni extremist group. Although the West publicly minimizes the role that foreign Shi’ite fighters play in the coalition’s battle against ISIS, Hezbollah’s formidable military posture and its ability to foster support against a common enemy beyond its Shi’ite constituency render it an essential part of the fight against Sunni extremism.

Recent open source footage chronicles Hezbollah’s pro-Assad battlefield actions and illustrates the commitment and fierceness of the group’s operations: Youtube videos show military battles against both al-Qaeda’s Syrian affiliate Jabhat al-Nusra, as well as against ISIS, after Hezbollah began an offensive within the Syrian Qalamoun Mountains along the Lebanese-Syrian border.

In addition to its advanced weapons cache, Hezbollah continues to tactically innovate, the prime example being its employment of commercial short-range UAVs. The drones assist in the planning of assaults, conduct reconnaissance and support real-time combat operations via live feeds.

A recently revealed UAV airstrip in the Lebanese Beka’a valley, close to the Syrian border, underlines the role of technological innovation in Hezbollah’s operations as well as the group’s longer-term commitment to defending the Assad regime. While Hezbollah has employed Iranian-made drones against Israel since 2004, its construction of an airstrip as well as its switch to commercial drones against other non-state actors proves how seriously the group takes its involvement in Syria.

The stakes

Hezbollah’s engagement in Syria was undoubtedly requested by Iran, its main sponsor, who directed Hezbollah to support its prime regional Shi’ite ally by fighting the Syrian opposition and Sunni extremists alike. Yet Hezbollah’s involvement also reflects deep personal stakes because it could be immeasurably damaged were the Syrian regime to fall. By bolstering Assad’s forces, the Shi’ite group preserves its relationship to the state and ensures that important logistical and weapons supply routes are kept accessible. At the same time, it fends off an expansion of Sunni extremism that threatens to spillover into neighbouring countries.

Risks and opportunities

Hezbollah’s active regional presence comes with a plethora of consequences that will be decisive for the group’s future. Success on the battlefield will bolster Hezbollah’s reshaped identity as living proof that the group has evolved from merely a defender of Lebanese Shi’ites against Israel to a defender of the Shi’ite faith within the entire region. In an echo of the Arab World’s overwhelmingly supportive reaction to Hezbollah after the second Lebanon War in 2006, an effective Syria campaign would exponentially boost the group’s regional influence and elevate it into a key stakeholder in the Middle East. A successful extension of Assad’s grip on Syria would keep the Iranian-led Shi’ite Axis intact and continue to allow Hezbollah a logistical safe-haven to sustain smooth operations.

Military successes would further maintain Hezbollah’s position within Lebanon and promote continued, self-sustained domestic recruitment into the organisation. A worry, especially promulgated by Israel, is that Hezbollah’s engagement in Syria could battle-harden its troops who will gain valuable skills and combat experience that will give them an edge in potential future conflicts with its primary enemy Israel. This concern is not unwarranted, as the group is already bolstering its military capabilities by cleaning out Syria’s weapons depots and stockpiling them in southern Lebanon. However, due to its deep commitments in Syria and other regional crises, it would seem suicidal for Hezbollah to embark upon an offensive against Israel at this time.

At the same time, continued involvement in Syria without visible successes may lead to a rift between Hezbollah’s leadership and its followers. Since its involvement in domestic politics in 1992, the group has become more accountable to its constituency who – with unprecedented magnitude – have voiced concerns about the legitimacy of the Syrian intervention. The leadership is being forced to justify the sacrifice of Shi’ite lives in a conflict that at present does not pose any immediate threats to Lebanon, thereby straining the coherency of Hezbollah’s narrative. While imposing speeches by Hezbollah’s Secretary-General Hassan Nasrallah continue to maintain widespread and fervent support among its members, rebellion within its own ranks may become a more pressing issue as the conflict moves on without resolution and battle-weariness sets in.

In addition to the risk of internal division, Hezbollah also faces potential over-exertion by waging a multi-front campaign that could overstretch its forces and limit its operational capacities. While this may at first seem beneficial to Western national security interests, a weakening of the Shi’ite group would expose Lebanon’s defence capabilities, which depend on Hezbollah as the first line of defence. A weakened Hezbollah might also tempt ISIS to direct some elements towards Lebanon, especially in the face of Hezbollah’s propagation of anti-Sunni sentiment. Extreme battlefield attrition could thus render the group unable to defend Lebanon and make its home base an attractive target for the high-flaming sectarian tensions fostered by ISIS.

Conclusion

Hezbollah has repeatedly proven its adaptability to changing domestic and regional dynamics, which demonstrates the group’s strength and unpredictability. Yet the intervention in Syria pushes the group into a somewhat reactive position, as Hezbollah’s fate now hinges on Assad’s perseverance and on ISIS’ success or failure. Should Hezbollah manage to push back the Sunni extremist factions, the prospective rewards are likely to elevate the group’s domestic and regional standing beyond anything it has ever experienced. However, the risks of failure are great, as an unsuccessful mission in Syria threatens to unravel the group’s reputation for strong ideological and organisational coherence. In a worst-case scenario, Hezbollah’s risky enterprise could daisy-chain Lebanon into the events in Syria and push the country into the black hole of sectarian violence.


Kitty Veress is a recent graduate from the M.A. Security Studies Program at the School of Foreign Service, Georgetown University. Her research focuses on non-state violent actors and the nexus between psychology and terrorism. She currently lives in Washington, DC, and is about to take up her PhD studies at King’s College London’s War Studies Department on the topic of European foreign fighters and their decision-making processes. Follow her @Kitonia

Filed Under: Blog Article Tagged With: drones, Hezbollah, ISIS, Israel, Lebanon, Syria

  • « Go to Previous Page
  • Go to page 1
  • Go to page 2
  • Go to page 3
  • Go to page 4
  • Go to Next Page »

Footer

Contact

The Strife Blog & Journal

King’s College London
Department of War Studies
Strand Campus
London
WC2R 2LS
United Kingdom

blog@strifeblog.org

 

Recent Posts

  • Climate-Change and Conflict Prevention: Integrating Climate and Conflict Early Warning Systems
  • Preventing Coup d’Étas: Lessons on Coup-Proofing from Gabon
  • The Struggle for National Memory in Contemporary Nigeria
  • How UN Support for Insider Mediation Could Be a Breakthrough in the Kivu Conflict
  • Strife Series: Modern Conflict & Atrocity Prevention in Africa – Introduction

Tags

Afghanistan Africa Brexit China Climate Change conflict counterterrorism COVID-19 Cybersecurity Cyber Security Diplomacy Donald Trump drones Elections EU feature France India intelligence Iran Iraq ISIL ISIS Israel ma Myanmar NATO North Korea nuclear Pakistan Politics Russia security strategy Strife series Syria terrorism Turkey UK Ukraine United States us USA women Yemen

Licensed under Creative Commons (Attribution, Non-Commercial, No Derivatives) | Proudly powered by Wordpress & the Genesis Framework