“I’ve looked at clouds from both sides now…”

Eyal Weizman‘s stunning Wall Exchange, “Forensic Architecture”, which he presented at the Vogue Theatre in Vancouver earlier this month, is now up on YouTube here and embedded below.

If you are puzzled by my riff on Joni Mitchell, start around 46:10 (though you’ll miss a lot if you do…).

And while we’re on the subject of clouds, you’ll find a remarkable analysis of a different sort of militarized cloud in Tung-Hui Hu‘s A Prehistory of the Cloud from MIT:

We may imagine the digital cloud as placeless, mute, ethereal, and unmediated. Yet the reality of the cloud is embodied in thousands of massive data centers, any one of which can use as much electricity as a midsized town. Even all these data centers are only one small part of the cloud. Behind that cloud-shaped icon on our screens is a whole universe of technologies and cultural norms, all working to keep us from noticing their existence. In this book, Tung-Hui Hu examines the gap between the real and the virtual in our understanding of the cloud.

Hu shows that the cloud grew out of such older networks as railroad tracks, sewer lines, and television circuits. He describes key moments in the prehistory of the cloud, from the game “Spacewar” as exemplar of time-sharing computers to Cold War bunkers that were later reused as data centers. Countering the popular perception of a new “cloudlike” political power that is dispersed and immaterial, Hu argues that the cloud grafts digital technologies onto older ways of exerting power over a population. But because we invest the cloud with cultural fantasies about security and participation, we fail to recognize its militarized origins and ideology. Moving between the materiality of the technology itself and its cultural rhetoric, Hu’s account offers a set of new tools for rethinking the contemporary digital environment.

Prehistory of the Cloud

Here is Lisa Parks on what is surely one of the must-reads of the year:

“Hu’s riveting genealogy of the cloud takes us into its precursors and politics, and boldly demonstrates how fantasies of sovereignty, security, and participation are bound up in it. Much more than a data center, the cloud is a diffuse and invisible structure of power that has yielded a data-centric order. Imaginative and lucidly written, this book will be core to digital media studies.”

“What is that sound high in the air?”

Coming from MIT in April next year, a new book by the ever-creative anthropologist Hugh Gusterson, Drone: remote control warfare.

GUSTERSON DroneDrones are changing the conduct of war. Deployed at presidential discretion, they can be used in regular war zones or to kill people in such countries as Yemen and Somalia, where the United States is not officially at war. Advocates say that drones are more precise than conventional bombers, allowing warfare with minimal civilian deaths while keeping American pilots out of harm’s way. Critics say that drones are cowardly and that they often kill innocent civilians while terrorizing entire villages on the ground. In this book, Hugh Gusterson explores the significance of drone warfare from multiple perspectives, drawing on accounts by drone operators, victims of drone attacks, anti-drone activists, human rights activists, international lawyers, journalists, military thinkers, and academic experts.

Gusterson examines the way drone warfare has created commuter warriors and redefined the space of the battlefield. He looks at the paradoxical mix of closeness and distance involved in remote killing: is it easier than killing someone on the physical battlefield if you have to watch onscreen? He suggests a new way of understanding the debate over civilian casualties of drone attacks. He maps “ethical slippage” over time in the Obama administration’s targeting practices. And he contrasts Obama administration officials’ legal justification of drone attacks with arguments by international lawyers and NGOs.

People of the bombI met Hugh at a conference on Orientalism and War in Oxford several years ago, and I’ve recently been reading his Nuclear Rites: a weapons laboratory and the end of the Cold War and People of the Bomb: Portraits of America’s Nuclear Complex as I continue my wanderings through the nuclear wastelands.

The coincidence between Hugh’s previous projects and his new one intersects with my presentation on “Little Boys and Blue Skies” in Toronto last week – see here and here – which sketched out a series of entanglements between drones and the nuclear wastelands (hence the Eliot quotation which serves as my title for this post).

The nuclear wastelands and cyberwar

I’m in Toronto, enjoying ‘Through Post-Atomic Eyes‘ enormously: wide-ranging yet focused, creative and critical, and above all wonderfully welcoming.  I’m also relieved – I’ve only been wandering in the nuclear wastelands for a matter of months, and being surrounded by scholars and artists who know so much more about these vexed issues has been truly invigorating.  I’ll post the slides from my presentation shortly – in the meantime, see here and here – but while I was searching for images I re-discovered this cover from The Economist:

economist_cyberwar

Since my own presentation tried to sort out the entangled geographies of nuclear weapons and drones, I would be the very last person to object to the continuity conjured up by The Economist‘s apocalyptic vision: in fact yesterday both Joseph Masco and James Bridle in two sparkling presentations emphasised the intimacy of  the connections between computing, nuclear testing and the security state.

So it seems appropriate that my  e-flânerie should also have led me to a special issue of CyberOrient, edited by Helga Tawil-Souri, is appropriately online now (and open access), devoted to cyberwarfare:

This special issue of CyberOrient engages with the relationships between “cyber” and “real” battlespaces, the mediatization of war, the need to expand our definition of warzones, and the importance of asking who participates in wars, to what ends, using what kinds of technologies, and for what purposes. Taken together, the five essays demonstrate the expansion and blurring of the spaces of war. As importantly, they highlight that even warfare that is “only” fought in the virtual realm is laced with violent intents and real-life repercussions. Not only can we not separate the cyber from the real so neatly, but we must not overlook that no matter how we wish to classify “new” or cyber wars, it is citizens, along with their ways of life and their cultural records, that continue to be by far the largest losers.

fp

Contents:

Helga Tawil-Souri, Problematizing Cyberwarfare

Donatella Della Ratta, Violence and visibility in contemporary Syria: an ethnography of the “expanded places

Ruth Tsuria, Islamophobia in online Arab media

Emily Fekete, The shifting nature of cyberwarfare in Middle Eastern states

Attila Kovacs, Visual representation, propaganda and cyberspace: the case of the Palestinian Islamist movements

Christoph Günter, Presenting the glossy look of warfare in cyberspace – the Islamic State’s magazine Dabiq

Drones and atomic clouds

I’m off to Toronto on Thursday to speak at the symposium “Through Post-Atomic Eyes“.  I posted some of my earlier notes for my presentation, ‘Little Boys and Blue Skies: Drones through post-atomic eyes‘, and since then I’ve been digging deeper into the strange intersections between nuclear weapons and today’s Predators and Reapers.

In my original post I described the US Air Force’s early attempts to devise a way of delivering atomic bombs from remotely piloted aircraft – notably Project Brass Ring:

B-47 drone.001

Following a tip from Matt Farish (who will also be speaking at the conference) I’ve now discovered that drones were also used to monitor the ‘atomic clouds’.

Shortly after the Second World War the US Air Force’s Pilotless Aircraft Branch resumed its experiments with remotely controlling B-17 bombers from ‘director aircraft’ and from ground stations:

B17 experiments.001

By July 1946 six to them were being successfully operated by the Army Air Group’s Drone Unit, and they were in action over Bikini Atoll in the Marshall Islands for the series of nuclear tests known as Operation Crossroads.   The first test (Able) was carried out on 1 July 1946, when a B-29 Superfortress (“Dave’s Dream”) dropped a plutonium bomb of the same power used against Nagasaki from a height of 30,000 feet on a target fleet of 90 obsolete ships; it was an air burst, detonating 520 feet above the ships (the aim point was the battleship USS Nevada, perhaps appropriately enough given that state’s use for nuclear testing in the decades ahead; it was painted bright red to make it visible to the bombardier, but the bomb missed it y 1870 feet).

Bikini2

Operation Crossroads Target Array

The B-17s were on station 20-30 miles away, and they were the first to approach the target area.  Eight minutes after Mike Hour one of them entered the cloud at 24,000 feet, followed by three others at 30,000 feet, 18,000 feet and 13,000 feet.  The image below shows a B-17 landing at Eniwetok under ground control:

B-17 drone Bikini

There was nothing secret about their use – like the bomb itself, making the drones public was a vital part of demonstrating American military and technical superiority.  Here, for example, is an image from Mechanix Illustrated in June 1946 describing Operation Crossroads :

Crossroads at Bikini Mexhanix Illustrated June 1946

According to Bombs at Bikini, the official (public) report on Operation Crossroads, prepared for Join Task Force One and published in 1947:

A number of Army Air Forces officials believe that the drone-plane program undertaken for Crossroads advanced the science of drone-plane operations by a year or more. To be sure, a fewwar-weary B-17’s had been flown without crews during the latter part of the recent war [Operation Aphrodite], but they and their cargoes of explosives were deliberately crash-landed. Also, a few B-17’s had been landed by remote control; but pilots were aboard, ready to take over control in case of trouble. Operation Crossroads was the first operation in which take-off, flight, and landing were accomplished with no one aboard. The feat was an impressive one; many experts had thought it could never be accomplished with planes of this size.

As this video clip shows (start at 6.01), take-off was under the control of a ‘ground beep pilot’, who then handed over to a ‘beep television control pilot’ in an accompanying director aircraft (‘the mother ship’), who handed back to the ground beep pilot for the landing.  This parallels today’s ‘remote-split operations’, though on a greatly reduced spatial scale, where a Launch and Recovery crew stationed in or near the combat zone is responsible for take-off and landing while the mission is flown by a ground control crew in the continental United States):

The B-17 drones operated in concert with the US Navy’s F6F-5 Hellcat drones which made transits of the cloud at 20,000 feet, 15,000 feet and 10,000 feet (see the first image below; the tail fins are painted different colours to indicate different control frequencies: more here).  The second image shows a pilot on the deck of the aircraft carrier Shangri-La controlling an F6F-5 before take-0ff; landing on the deck of a carrier was difficult enough at the best of times and with a skilled crew on board, and not surprisingly the Navy drones returned to Roi island, part of Kwajalein Atoll.

Hellcats-Bikini-1946.jpg__600x0_q85_upscale

shangri-la.jpg__600x0_q85_upscale

Paul Hoversten reports:

No manned aircraft flew over the center of the blast, called Zeropoint, until four hours later, although manned boats were on the scene after two hours.  Drones were also flown after the second test, Baker, on July 25, which was an underwater shot suspended from a target ship in Bikini’s lagoon.

Bikini atoll target disposition

In each case the drones were tasked to take air samples from the cloud (using filters housed in boxes under the wings) and to photograph the cloud formation:

Bikini 4

As the official pictorial record boasted (its very existence underlining the importance of a controlled ‘publicness’ to these tests):

Drone planes penetrated where no man could have ventured, flew through the mushroom cloud on photographic missions, sampled its poisonous content, televised to remote onlookers their instrument panel readings for flight analysis.

The samples were crucial, and drones remained of vital importance in collecting them.  The image below shows the air filters being removed from a remotely operated B-17 used in Operation Sandstone (a series of nuclear tests conducted by the Atomic Energy Commission at Eniwetok Atoll in 1948):

Boeing_B-17_drone_at_Eniwetok_1948

The capstone attempt to deliver atomic bombs by remote controlled aircraft, Project Brass Ring, was abandoned in March 1951 when the Air Force determined that a manned aircraft could execute the bomb delivery safely (at least for those on board), but drones continued to be used during atomic tests.  In 1953 QF-80 drones were in use at Indian Springs, the Air Force portal to the Nevada Proving Grounds (the full story is here):

Drones at Indian Springs.001Drones at Indian Springs 2.001

Lockheed QF-80 drone (FT-599) and director aircraft (a Lockheed DT33) ready for take-off at Indian Springs

Lockheed QF-80 drone (FT-599) and director aircraft (a Lockheed DT33) ready for take-off at Indian Springs

This was the first time ‘jet drones’ had been used during continental tests.  NULLO (‘No Live Operator Onboard’) operations used the same system of hand offs between beep pilots and director aircraft that had been used for the B-17s, but Sperry claimed that its precision marked a new milestone in remote operations.  Here’s a video of the drones in operation – and the effects of the blast on the aircraft:

But some tests were designed to evaluate the effects of the blast and the cloud on living creatures.  Here is a clipping from the Chicago Tribune, reporting on a test carried out over Nevada on 6 April 1953 – in fact the mission shown in the last still photograph above.  Note that the radiation effects were expected to be so powerful that all air traffic was excluded from an area of 100,00 square miles:

Chicago Tribune 6 April 1953

Today Indian Springs is known as Creech Air Force Base: the operating hub for the US Air Force’s MQ-1 Predators and MQ-9 Reapers…

Tanner respondents

I’m delighted that Grégoire Chamayou and Chris Woods have both accepted invitations to act as discussants and interlocutors for my Tanner Lectures, “Reach from the Sky: aerial violence and the everywhere war“, in Cambridge in January.

The format for the Lectures is for me to give two presentations on the first day; the next day a panel of four respondents offers reactions and comments, and then we open up into general debate and discussion.

9780241970355I provided a series of detailed commentaries on Grégoire’s variously titled Drone Theory/A Theory of the Drone when it was originally published in French (see here for a full listing: scroll down), and we met last year at a wonderful workshop on Secrecy and Transparency at the Humanities Research Institute at Irvine, so I’m thrilled that the tables will be reversed.  Grégoire’s creative imagination seems to know no bounds – see, for example, here and here – and we keep in close touch so I know this will be a rewarding conversation.

9780190202590I’ve never met Chris, but I’m really looking forward to doing so: he has worked with the Bureau of Investigative Journalism; his Sudden Justice: America’s secret drone wars is the gold standard for books about the conduct of US remote operations; and he is now busy at Airwars monitoring coalition air strikes over Iraq and Syria.  I greatly admire Chris’s combination of probing analysis and lucid prose, and his determination to bring the results to the widest possible public audience is an inspiration.

More on other respondents later.

Archives of the Insensible

9780226277332News from the ever interesting Allen Feldman of his new book, Archives of the Insensible: of war, photopolitics and dead memory, coming from Chicago in December:

In this jarring look at contemporary warfare and political visuality, renowned anthropologist of violence Allen Feldman provocatively argues that contemporary sovereign power mobilizes asymmetric, clandestine, and ultimately unending war as a will to truth. Whether responding to the fantasy of weapons of mass destruction or an existential threat to civilization, Western political sovereignty seeks to align justice, humanitarian right, and democracy with technocratic violence and visual dominance. Connecting Guantánamo tribunals to the South African Truth and Reconciliation Commission, American counterfeit killings in Afghanistan to the Baader-Meinhof paintings of Gerhard Richter, and the video erasure of Rodney King to lynching photography and political animality, among other scenes of terror, Feldman contests sovereignty’s claims to transcendental right — whether humanitarian, neoliberal, or democratic—by showing how dogmatic truth is crafted and terror indemnified by the prosecutorial media and materiality of war.

Excavating a scenography of trials —formal or covert, orchestrated or improvised, criminalizing or criminal — Feldman shows how the will to truth disappears into the very violence it interrogates. He maps the sensory inscriptions and erasures of war, highlighting war as a media that severs factuality from actuality to render violence just. He proposes that war promotes an anesthesiology that interdicts the witness of a sensory and affective commons that has the capacity to speak truth to war. Feldman uses layered deconstructive description to decelerate the ballistical tempo of war to salvage the embodied actualities and material histories that war reduces to the ashes of collateral damage, the automatism of drones, and the opacities of black sites. The result is a penetrating work that marries critical visual theory, political philosophy, anthropology, and media archeology into a trenchant dissection of emerging forms of sovereignty and state power that war now makes possible.

Here is the wonderful Talal Asad on the book:

Archives of the Insensible is a remarkable diagnosis of our time, tracing with great subtlety the multiple ways in which violence is transformed into justice and justice gives birth to destruction. This is a startling book written with passion and insight, and a valuable contribution to our understanding of the relationship of violence to international law in the contemporary world.

You can see why I’m so interested…

The Drone Papers

Drone Papers header JPEG

The Intercept has released a new series of documents – not from Edward Snowden – that provide extraordinary details about the Obama administration’s targeted killing operations (especially in Afghanistan, Yemen and Somalia).

I haven’t had a chance to work through them yet – today is taken up with teaching and Eyal Weizman‘s visit for tonight’s Wall Exchange – but I imagine that readers who don’t already have their heads up will welcome a head’s up.

The reports include a considerable number of informative graphics (taken from briefing slides) together with analysis.  Here is the full list:

The Assassination Complex (by Jeremy Scahill)

A visual glossary (by Josh Begley)

The Kill Chain (by Jeremy Scahill)

Find, Fix, Finish (by Jeremy Scahill)

Manhunting in the Hindu Kush (by Ryan Devereaux)

Firing Blind (by Cora Currier and Peter Maass)

The Life and Death of Objective Peckham (by Ryan Gallagher)

Target Africa (by Nick Turse)

More to come when I’ve worked through the reports, slides and analyses.

More tortured geographies

Route Map 2

There have been several attempts to reconstruct the geography of the CIA’s program of extraordinary rendition. I’ve long admired the work of my good friend Trevor Paglen, described in his book with A.C. ThompsonTorture Taxi: on the trail of the CIA’s rendition flights, available in interactive map form through Trevor’s collaboration with the Institute for Applied Autonomy as Terminal Air. (I’ve commented on the project before, here and especially here).

terminal-air

And you can only applaud Trevor’s chutzpah is displaying the results of his work on a public billboard:

paglenemerson-cia-flights-2001-6

The project, which involved the painstaking analysis of countless flight records and endless exchanges with the geeks who track aircraft as a hobby, triggered an installation in which the CIA was reconfigured as a ‘travel agency‘:

Terminal Air travel agency

At the time (2007), Rhizome – which co-sponsored the project – explained:

Terminal Air is an installation that examines the mechanics of extraordinary rendition, a current practice of the United States Central Intelligence Agency (CIA) in which suspected terrorists detained in Western countries are transported to so-called “black sites” for interrogation and torture. Based on extensive research, the installation imagines the CIA office through which the program is administered as a sort of travel agency coordinating complex networks of private contractors, leased equipment, and shell companies. Wall-mounted displays track the movements of aircraft involved in extraordinary rendition, while promotional posters identify the private contractors that supply equipment and personnel. Booking agents’ desks feature computers offering interactive animations that enable visitors to monitor air traffic and airport data from around the world, while office telephones provide real-time updates as new flight plans are registered with international aviation authorities. Seemingly-discarded receipts, notes attached to computer monitors, and other ephemera provide additional detail including names of detainees and suspected CIA agents, dates of known renditions, and images of rendition aircraft. Terminal Air was inspired through conversations with researcher and author Trevor Paglen (Torture Taxi: On the Trail of the CIA’s Rendition Flights – Melville House Publishing). Data on the movements of the planes was compiled by Paglen, author Stephen Grey (Ghost Plane: The True Story of the CIA Torture Program – St. Martin’s Press) and an anonymous army of plane-spotting enthusiasts.

There’s a short video documenting the project on Vimeo here and embedded below (though strangely Trevor isn’t mentioned and doesn’t appear in it):

Although Trevor subsequently explained why he tried to ‘stay away from cartography and “mapping” as much as possible’ in his work, preferring instead the ‘view from the ground’, the cartography of all of this matters in so many ways – from the covert complicity of many governments around the world in a global geopolitics of torture through to the toll exerted on the bodies and minds of prisoners as they were endlessly shuffled in hoods and chains over long distances from one black site to another.

And now, thanks to the equally admirable work of the Bureau of Investigative Journalism, it’s possible to take the analysis even further.  Here is Crofton Black and Sam Raphael introducing their project, ‘The boom and bust of the CIA’s secret torture sites‘:

In spring 2003 an unnamed official at CIA headquarters in Langley sat down to compose a memo. It was 18 months after George W Bush had declared war on terror. “We cannot have enough blacksite hosts,” the official wrote. The reference was to one of the most closely guarded secrets of that war – the countries that had agreed to host the CIA’s covert prison sites.

Between 2002 and 2008, at least 119 people disappeared into a worldwide detention network run by the CIA and facilitated by its foreign partners.

Lawyers, journalists and human rights organisations spent the next decade trying to figure out whom the CIA had snatched and where it had put them. A mammoth investigation by the US Senate’s intelligence committee finally named 119 of the prisoners in December 2014. It also offered new insights into how the black site network functioned – and gruesome, graphic accounts of abuses perpetrated within it.

Many of those 119 had never been named before.

The report’s 500-page summary, which contained the CIA official’s 2003 remarks, was only published after months of argument between the Senate committee, the CIA and the White House. It was heavily censored, while the full 6,000-page study it was based on remains secret. All names of countries collaborating with the CIA in its detention and interrogation operations were removed, along with key dates, numbers, names and much other material.

In nine months of research, the Bureau of Investigative Journalism and The Rendition Project have unpicked these redactions to piece together the hidden history of the CIA’s secret sites. This account unveils many of the censored passages in the report summary, drawing on public data sources such as flight records, aviation contracts, court cases, prisoner testimonies, declassified government documents and media and NGO reporting.

Although many published accounts of individual journeys through the black site network exist, this is the first comprehensive portrayal of the system’s inner dynamics from beginning to end.

CIA black sites (BOIJ:REndition Project)

At present the mapping is rudimentary (see the screenshot above), but the database matching prisoners to black sites means that it ought to be possible to construct a more fine-grained representation of the cascade of individual movements.  The Rendition Project has already identified more than 40 rendition circuits involving more than 60 renditions of CIA prisoners: see here and the interactive maps here.

Watching the detectives

Hospital bombing, Kunduz, October 2015 MSF

I wrote about medical neutrality earlier this year (see here).  As I noted then, Physicians for Human Rights stipulates that medical neutrality requires:

The protection of medical personnel, patients, facilities, and transport from attack or interference;
Unhindered access to medical care and treatment;
The humane treatment of all civilians; and
Nondiscriminatory treatment of the sick and injured.

In the wake of the US air strike on a hospital operated by Médecins Sans Frontières  (MSF) in Kunduz on 3 October, that first requirement assumes even greater significance: the obligation is not merely to exempt medical personnel, patients and infrastructure from military and paramilitary violence but to protect them from attack.

MSF provides details and updates on the strike here.  As I write, far and away the most substantial commentary on what happened – given what we know so far – is Kate Clark‘s detailed analysis at the Afghan Analysts Network here (though Matt Lee‘s angry comparison with an Israeli military attack on a hospital in Gaza is worth reading too).  As Kate notes,

Expressing distrust in the US military, NATO or Afghan government to uncover the truth, [MSF] said it wants an investigation by the International Humanitarian Fact-Finding Commission (IHFFC), a body set up by the Additional Protocols of the Geneva Conventions and, says MSF, is the only permanent body set up specifically to investigate violations of international humanitarian law. It has never been used before and, as neither Afghanistan or the United States have formally recognized the Commission, any investigation would have to be voluntary.

logo_ihffcThe IHFFC issued this statement today:

The International Humanitarian Fact-Finding Commission (IHFFC) has been contacted by Médecins Sans Frontières (MSF, Doctors Without Borders) in relation to the events in Kunduz, Afghanistan, on 3 October 2015.

The IHFFC stands ready to undertake an investigation but can only do so based on the consent of the concerned State or States. The IHFFC has taken appropriate steps and is in contact with MSF. It cannot give any further information at this stage.

Alex Jeffrey has commented briefly on the geopolitics of any investigation by the IHFFC, but there has been little or no commentary on how the US military investigates civilian casualty incidents – and this merits discussion because the Obama administration has insisted that the inquiry already under way by the Pentagon will be ‘transparent’, ‘thorough’ and ‘objective’.  And whatever may or may not transpire with respect to the IHFFC, it’s exceptionally unlikely that the US military investigation will be stopped.

I’ve worked through five investigations of so-called ‘CIVCAS’ in Afghanistan that have been released through Freedom of Information Act requests.  Each branch of the US military is required to maintain its own digital FOIA Reading Room, so that any documentation supplied in response to these requests is released into the public domain.  I should say that you need to be adept at using the search function, and to have a very good idea of what you are looking for before you start (though the Pentagon has been remarkably helpful in responding to my inquiries and questions).

It’s also fair to say that the release of investigation reports is uneven.  In the immediate aftermath of an earlier, devastating air strike on two tankers hijacked by the Taliban near Kunduz, called in by the German Bundeswehr but carried out by two US aircraft (see my extended discussion here), the United States repeatedly promised to release the investigation report: but it never did, even to the German Bundestag’s committee of inquiry, and despite repeated requests it remains classified.

There is also considerable variation in the transparency and quality of the reports that have been released: some are so heavily redacted that it is extremely (and no doubt intentionally) difficult to construct a reasonably comprehensive narrative, while others are the product of inquiries that seem to have been, at best, perfunctory.

AR 15-6 CIVCAS Uruzgan February 2010

The report into the airstrike in Uruzgan that I have been using for my analysis of the US air strike in Uruzgan in February 2010 – see ‘Angry Eyes (1)‘ and ‘Angry Eyes (2)‘: more to come – is neither.  It has been redacted, presumably for reasons of national, operational or personal security, but its 2,000 pages provide enough detail to reconstruct most of what happened.  And the investigation team was remarkably thorough: by turns forensic, sympathetic, exasperated and eventually blisteringly angry at what they found.  Whether this provides an indication of what we can expect from the present inquiry I don’t know, but it does provide a benchmark of sorts for what we (and, crucially, MSF) ought to expect.  (There are also ongoing investigations by NATO and by the Afghan authorities, but no details have been released about them either).

The strike took place on 21 February 2010, and the very next day General Stanley McChrystal (Commander US Forces – Afghanistan and ISAF, Afghanistan) appointed Major-General Timothy McHale to conduct what the US Army calls ‘an informal investigation’ into the incident that ‘allegedly resulted in the deaths of 12-15 local Afghan nationals and caused injured to others’; McHale was assisted by a team of senior officers, including subject matter experts and legal advisers:

GREGORY Angry Eyes 2015 IMAGES.139

There are two points to note here.

First, this was an investigation conducted by the US Army because the airstrike had been called in by US Special Forces and had been carried out by two US Army helicopter crews.  But the strike was orchestrated in large measure by a US Air Force Predator crew from Creech Air Force Base in Nevada; in addition to questioning the soldiers and helicopter crews involved, McHale’s team also questioned the Predator flight crew together with the screeners and video analysts at Air Force Special Operations Command at Hurlburt Field in Florida.  McHale’s report triggered a second ‘Commander-Directed Investigation’ by US Air Force Brigadier-General Robert Otto into the actions and assessments of the Predator crew; that report was submitted on 30 June 2010.  As I write, it’s not known who is leading the US investigation into the bombing of the hospital in Kunduz.  Since (on the fourth telling) the strike appears to have been called in by US Special Forces (at the request of Afghan forces) and carried out by a US Air Force AC-130 gunship this will presumably be a joint investigation.

Second, the term ‘informal investigation’ is a technical one; certainly, on McHale’s watch the conduct of the inquiry was remarkably rigorous.  US Army Regulation 15-6 sets out how the Army is to conduct an investigation:

‘The primary function of any investigation or board of officers is to ascertain facts and to report them to the appointing authority. It is the duty of the investigating officer or board to ascertain and consider the evidence on all sides of each issue, thoroughly and impartially, and to make findings and recommendations that are warranted by the facts and that comply with the instructions of the appointing authority.’

Here is the distinction between informal and formal investigations (I’ve taken this summary from a US Army Legal Guide here; the full version, specifying the conduct of an informal investigation, is here and here):

Informal investigations may be used to investigate any matter, to include individual conduct. The fact that an individual may have an interest in the matter under investigation or that the information may reflect adversely on that individual does not require that the proceedings constitute a hearing for that individual. Even if the purpose of the investigation is to inquire into the conduct or performance of a particular individual, formal procedures are not mandatory unless required by other regulations or by higher authority. Informal investigations provide great flexibility. Generally, only one investigating officer is appointed (though multiple officers could be appointed); there is no formal hearing that is open to the public; statements are taken at informal sessions; and there is no named respondent with a right to counsel (unless required by Art 31(b), UCMJ); right to cross-examine witnesses; etc….

“Generally, formal boards are used to provide a hearing for a named respondent. The board offers extensive due process rights to respondents (notice and time to prepare, right to be present at all open sessions, representation by counsel, ability to challenge members for cause, to present evidence and object to evidence, to cross examine witnesses, and to make argument). Formal boards include a president, voting members, and a recorder who presents evidence on behalf of the government. A Judge Advocate (JA) is normally appointed as recorder but is not a voting member. If a recorder is not appointed, the junior member of the board acts as recorder and is a voting member. Additionally, a non-voting legal advisor may be appointed to the board. Formal AR 15-6 investigations are not normally used unless required by regulation.’

In setting all this out, I should add two riders.  In treating MG McHale’s investigation in such detail, I don’t mean to imply that I fully concur with its analysis.  This is a judgement call, of course: the redactions make it difficult to press on several key issues, all of which relate to who knew what when and where (more to come on this).  And neither do I mean to suggest that any US military investigation into what happened in Kunduz, however probing, would be adequate. As MSF’s Chris Stokes has said, ‘relying only on an internal investigation by a party to the conflict would be wholly insufficient.’  But if the report is conducted with the same careful attention to detail – and if it is released with minimal redactions – it would provide a necessary resource for all those involved in and affected by this truly appalling incident.

More to come – I hope.

UPDATE (1):  The US investigation is headed by Brigadier-General Richard Kim.  Nancy Youssef reports that his arrival in Kunduz was delayed ‘because of instability in the northern Afghan city.’ As with the Uruzgan air strike in 2010, the video recording from the AC-130 gunship that carried out the attack, together with audio recordings of conversations between the air crew and ground troops, will be of great importance.  According to Youssef, these show that ‘rules of engagement—the guidelines for the use of force—were misapplied.’  (In the Uruzgan case, the radio conversations between the air crew(s) and the Joint Terminal Attack Controller on the ground were released in redacted form in response to a FOIA request; apart from a single image of the strike, however, the video remains classified.)

I’ve previously noted the debate surrounding the Pentagon’s new Law of War manual which was issued in June 2015; since the US has admitted that the strike on the hospital was carried out within the US chain of command, section 7.17 on ‘Civilian hospitals and their personnel’ is particularly relevant (see also the Guardian report here):

During international armed conflict, civilian hospitals organized to give care to the wounded and sick, the infirm, and maternity cases, may in no circumstances be the object of attack, but shall at all times be respected and protected by the parties to the conflict.

7.17.1 Loss of Protection for Civilian Hospitals Used to Commit Acts Harmful to the Enemy. The protection to which civilian hospitals are entitled shall not cease unless they are used to commit, outside their humanitarian duties, acts harmful to the enemy.

7.17.1.1 Acts Harmful to the Enemy. Civilian hospitals must avoid any interference, direct or indirect, in military operations, such as the use of a hospital as a shelter for able-bodied combatants or fugitives, as an arms or ammunition store, as a military observation post, or as a center for liaison with combat forces. However, the fact that sick or wounded members of the armed forces are nursed in these hospitals, or the presence of small arms and ammunition taken from such combatants and not yet handed to the proper service, shall not be considered acts harmful to the enemy.

7.17.1.2 Due Warning Before Cessation of Protection. In addition, protection for civilian hospitals may cease only after due warning has been given, naming, in all appropriate cases, a reasonable time limit, and after such warning has remained unheeded.

2008-1

The obligation to refrain from use of force against a civilian medical facility acting in violation of its mission and protected status without due warning does not prohibit the exercise of the right of self-defense. There may be cases in which, in the exercise of the right of self- defense, a warning is not “due” or a reasonable time limit is not appropriate. For example, forces receiving heavy fire from a hospital may exercise their right of self-defense and return fire. Such use of force in self-defense against medical units or facilities must be proportionate. For example, a single enemy rifleman firing from a hospital window would warrant a response against the rifleman only, rather than the destruction of the hospital.

MSF has consistently denied that anyone was firing from the hospital; it has also insisted that it received no advance warning of the attack – on the contrary, MSF ensured that all US and Afghan forces had the co-ordinates of the hospital, and made frantic phone calls to try to stop the bombing once it started.

UPDATE (2):  A team from the Washington Post has produced a remarkably detailed report, ‘based on multiple interviews in Afghanistan and the United States with U.S. and Afghan military officials, Doctors Without Borders personnel and local Kunduz residents’; it includes maps and a graphic showing exactly what an AC-130 is capable of.

w512

As you can see, the illustration makes much of the aircraft’s concentrated firepower, unleashed as it circles counter-clockwise around the target in a five-mile orbit, but the AC-130 also has an extensive sensor suite on board (see ‘Angry Eyes (1)‘: an AC-130 was involved in the early stages of the Uruzgan incident).  The reporters do note that the aircraft is equipped with ‘low-light and thermal sensors that give it a “God’s eye [view]” of the battlefield in almost all weather conditions’ – but, as I’ve tried to show in my posts on Uruzgan (and as we know from other sources!), there’s no such thing as a God’s eye view.  Even so, the aircrew can surely have been in no doubt that they were bombing a hospital.

Angry Eyes (2)

MAP isaf-rc-south

This is the second installment of my analysis of an air strike orchestrated by a Predator in Uruzgan province, Afghanistan on 21 February 2010; the first installment is here.

(4) Command and control?

What was happening in and around Khod was being followed not only by flight crews and image analysts in the continental United States but also by several Special Forces command posts or Operations Centers in Afghanistan.  In ascending order these were:

(1) the base from which ODA 3124 had set out at Firebase Tinsley (formerly known as Cobra);

(2) Special Operations Task Force-12 (SOTF-12), based at Kandahar;

(3) Combined Joint Special Operations Task Force – Afghanistan (CJSOTF-A) based at Bagram.

GREGORY Angry Eyes 2015 IMAGES.064

Once the ODA 3124 left the wire, command and support passed to SOTF-12; the OD-B at Tinsley had limited resources and limited (and as it happens intermittent) communications access and could only monitor what was happening.

That was normal, but in fact both higher commands did more or less the same: and the investigating team was clearly appalled.  At SOTF-12 all senior (field grade) officers were asleep during the period of ‘highest density of risk and threatening kinetic activity’ (although they had established ‘wake-up criteria’ for emergency situations).  The Night Battle Captain had been in post for just three weeks and had been given little training in his role; he received a stream of SALT reports from the Ground Force Commander of ODA 3124 (which detailed Size of enemy force, Activity of enemy force, Location and Time of observation) but simply monitored the developing situation – what one investigating officer characterised as ‘a pretty passive kind of watching’.

GREGORY Angry Eyes 2015 IMAGES.065

The same was true at CJSOTF-A (the staff there monitored 15-25 missions a day, but this was the only active operation that had declared a potential Troops in Contact).

When the more experienced Day Battle Captain entered the Joint Operations Center at Kandahar and was briefed by the Night Battle Captain he was sufficiently concerned to send a runner to ask the Judge Advocate, a military lawyer, to come to the JOC.  He believed the occupants of the vehicles were hostile but was not convinced that they posed an immediate threat to troops on the ground:  ‘I wanted to hear someone who was extremely smart with the tactical directive and use of CAS [Close Air Support] in a situation I hadn’t seen before’.

This was a smart call for many reasons; the commander of US Special Forces, Brigadier General Edward Reeder, told the inquiry: ‘Honestly I don’t take a shit without one [a JAG], especially in this business’.  Significantly, the Safety Observer at Creech testified that there was no ‘operational law attorney’ available onsite for aircrews conducting remote operations; conversely, JAGs were on the operations floor of CENTCOM’s Combined Air and Space Operations Centre at Ul Udeid Air Base and, as this case shows, they were available at operations centers established by subordinate commands in-theatre.

GREGORY Angry Eyes 2015 IMAGES.073

GREGORY Angry Eyes 2015 IMAGES.074

The JAG at Kandahar was not routinely called in for ‘Troops in Contact’ but on this occasion he was told ‘my Legal Opinion [was] needed at the OPCENT and that it wasn’t imminent but they wanted me to rush over there right away…’

Meanwhile up at Bagram Colonel Gus Benton, the commanding officer of CJSOTF-A, was being briefed by his second-in-command who understood that the Ground Force Commander’s intention was to allow the three vehicles to move closer to his position at Khod.  He thought that made sound tactical sense.

‘I said that … is what we did, we let them come to us so we can get eyes on them. During my time I never let my guys engage with CAS if they couldn’t see it. I said that is great and COL [Benton] said “that is not fucking great” and left the room.’

At 0820, ten minutes after the JAG entered the JOC at Kandahar, while he was watching the Predator feed, the phone rang: it was Benton.  He demanded Lt Colonel Brian Petit, the SOTF-12 commander, be woken up and brought to the phone:

GREGORY Angry Eyes 2015 IMAGES.076

He spectacularly mis-read the situation (not least because he mis-read the Predator feed).  It was true that the vehicles were in open country, and not near any compounds or villages; but Benton consistently claimed that the vehicles were ‘travelling towards our objective’ whereas – as MG McHale’s investigating team pointed out to him – they were in fact moving away from Khod.

GREGORY Angry Eyes 2015 IMAGES.077

GREGORY Angry Eyes 2015 IMAGES.078

There had also been some, inconclusive discussion of a possible ‘High Value Target’ when the vehicles were first tracked, but the presence of a pre-approved target on the Joint Prioritised Effects List (Benton’s ‘JPEL moving along this road’) had never been confirmed and the Ground Force Commander had effectively discarded it (‘above my authority’, he said).

Certainly, the JAG at Kandahar read the situation differently:

GREGORY Angry Eyes 2015 IMAGES.075

When Benton rang off, the JAG went over to the Day Battle Captain and Lt Col Petit and recommended an Aerial Vehicle Interdiction (AVI) team be called in for a show of force to stop the vehicles without engaging the occupants in offensive action.

They agreed; in fact another Task Force also watching the Predator feed called to make the same suggestion, and the Fires Officer set about arranging to use their Apache helicopters to conduct an AVI:

GREGORY Angry Eyes 2015 IMAGES.079

The Fires Officer had been responsible for setting up the Restricted Operating Zone for aircraft supporting the ODA – de-conflicting the airspace and establishing what aircraft would be available – but its management was de-centralised:

‘I establish the ROZ, give the initial layout of what assets are going on, and then I pass that to the JTAC [Joint Terminal Attack Controller with the Ground Force Commander at Khod].  I pass the frequencies to the assets and the JTAC controls them from there.’

At 0630, long before all this frantic activity at Kandahar, the two OH-58s had arrived at a short hold location beyond the ‘range of enemy visual and audio detection’, and at 0730 they had left to refuel at Tarin Kowt.  The Day Battle Captain and the Fires Officer both thought they were still off station.  In fact, the helicopters had returned to hold at Tinsley/Cobra at 0810 and flat pitched to conserve fuel (which means they landed and left the rotor blades spinning but with no lift); thirty minutes later the JTAC called them forward and the Predator began to talk them on to the target.

The Day Battle Captain had another reason for thinking he and his colleagues in the JOC had more time.  He maintained that the helicopters had been brought in not to engage the three vehicles but to provide air support if and when the ‘convoy’ reached Khod and the precautionary ‘AirTic’ turned into a real TIC or Troops in Contact:

‘… the CAS brought on station for his [the Ground Force Commander’s] use was not for the vehicles but for what we thought was going to be a large TIC on the objective. The weapons team that was pushed forward to his location was not for the vehicles, it was for the possibility of a large TIC on the objective based on the ICOM chatter that we had.’

That chimes with Benton’s second-in-command at Bagram, who also thought the Ground Force Commander was waiting for the ‘convoy’ to reach Khod, but neither witness explained the basis for their belief.  It was presumably a string of transmissions from the JTAC to the Predator crew: at 0538 he told them the Ground Force Commander wanted to ‘keep tracking them and bring them in as close as we can until we have CCA up’ (referring to the Close Combat Attack helicopters, the OH-58s); shortly before 0630 he confirmed that the Ground Force Commander’s intent was to ‘permit the enemy to close, and we’ll engage them closer when they’re all consolidated’; and at 0818 he was still talking about allowing the vehicles to ‘close distance.’

Yet this does not account for the evident urgency with which the Day Battle Captain and the JAG were concerned to establish ‘hostile intent’ and ‘immediate threat’.  When the vehicles were first spotted they were 5 km from Khod, and when they were attacked they were 12 km away across broken and difficult terrain: so what was the rush if the Ground Force Commander was continuing to exercise what the Army calls ‘tactical patience’ and wait for the vehicles to reach him and his force?

In fact, the messages from the Ground Force Commander had been mixed; throughout the night the JTAC had also repeatedly made it clear that the ODA commander’s intent was ‘to destroy the vehicles and the personnel’.  The Ground Force Commander insisted that ‘sometime between 0820 and 0830’ he sent a SALT report to SOTF-12 to say that he was going to engage the target.  Unfortunately there is no way to confirm this, because SOTF’s text records of the verbal SALT reports stopped at 0630 for reasons that were never disclosed (or perhaps never pursued), but it would explain why the JTAC’s log apparently showed the JAG contacting him at 0829 to confirm there were no women and children on the target.  It would also account for testimony by one of the screeners, who realised that the helicopters were cleared to engage at 0835, ten minutes before the strike, when the NCO responsible for monitoring the Predator feed at SOTF-12 ‘dropped’ into the ‘ISR’ (I presume the relevant chat room window), and in response:

‘The MC [Mission Intelligence Co-ordinator at Creech] passed that the OH58 were cleared to engage the vehicles. We were all caught off guard… It seemed strange because we had called out that these vehicles were going west. I don’t know how they determined these vehicles to be hostile… I brought up a whisper [private chat] with the MC, I said are you sure, what are the time frames when they will be coming in, and the MC responded saying we don’t know their ETA and at that moment the first vehicle blew up…’

Should those watching the events unfold have been taken aback when the vehicles were attacked?  According to the pilot of the Predator, he and his crew were surprised at the rapid escalation of events:

‘The strike ultimately came a little quicker than we expected…. we believed we were going to continue to follow, continue to pass up feeds… When he decided to engage with the helos when they did, it happened very quickly from our standpoint. I don’t have a lot of info or situational awareness of why the JTAC decided to use them when they did. When they actually came up … the JTAC switched me on frequencies. So we weren’t talking on the frequency I was talking to him on a different frequency to coordinate with the helos.

But their surprise was as nothing compared to the reaction of most observers when the first vehicle exploded.  The officer in charge of the screeners and imagery analysts who had been scrutinising the Predator feed at Air Force Special Operations Command at Hurlburt Field in Florida couldn’t believe it:

GREGORY Angry Eyes 2015 IMAGES.088

The Day Battle Captain testified:

‘I did not feel that the ground force commander would use any kind of close air support whatsoever to engage those vehicles… Based on the information that I had and looking at the vehicles move away it did not appear that they were moving towards the ground forces…

… as we were watching the Predator feed the first vehicles exploded. And everyone in the OPSCEN was immediately shocked… The amount of time from when that course of action approved by the SOTF commander to when we actually saw the strike occur there was no time, there was not adequate time to inform the ground commander that that was the course of action decided by the CJSOTF commander… I have phones ringing left and right, talking to people, trying to explain things, you know we look up on the screen and it happened…’

GREGORY Angry Eyes 2015 IMAGES.089

The Fires Officer:

‘I don’t think at any time anyone communicated to the GFC [Ground Force Commander] not to strike these vehicles because it is not something that we normally do. We feel that if he is in contact with the Predator and the OH-58s that we sent out to screen which we were not aware of and he is on the ground he generally has a pretty good picture of what is going on. He might be more privy to some conversation that he had with the OH-58 than what we know about. We normally give the GFC pretty big leeway on how they operate and the same with the JTAC because he has control of the assets and I am not going to try to take his assets away.’

In short, the investigation concluded that the Ground Force Commander never knew that an Aerial Vehicle Interdiction was being arranged, and neither of his higher commands were aware that he had cleared the helicopters to attack the three vehicles.

But, as I will show next, what lay behind these failures of communication was a de-centralised, distributed and dispersed geography of militarised vision whose fields of view expanded, contracted and even closed at different locations engaged in the administration of military violence.  Far from being a concerted performance of Donna Haraway‘s ‘God-trick’ – the ability to see everything from nowhere – this version of networked war was one in which nobody had a clear and full view of what was happening.

Part of this can be attributed to technical issues – the different fields of view available on different platforms, the low resolution of infra-red imagery (which Andrew Cockburn claims registers a visual acuity of 20/200, ‘the legal definition of blindness in the United States’), transmission interruptions, and the compression of full-colour imagery to accommodate bandwidth pressure.  So for example:

GREGORY Angry Eyes 2015 IMAGES.125

But it is also a matter of different interpretive fields.  Peter Asaro cautions:

‘The fact that the members of this team all have access to high-resolution imagery of the same situation does not mean that they all ‘‘see’’ the same thing. The visual content and interpretation of the visual scene is the product of analysis and negotiation among the team, as well as the context given by the situational awareness, which is itself constructed.’

The point is a sharp one: different visualities jostle and collide, and in the transactions between the observers the possibility of any synoptic ‘God-trick’ disappears.  But it needs to be sharpened, because different people have differential access to the distributed stream of visual feeds, mIRC and radio communications.  Here the disposition of bodies combines with the techno-cultural capacity to make sense of what was happening to fracture any ‘common operating picture’.   As one officer at Kandahar put it:

‘We didn’t have eyes on, minus ISR platform, that we can all see, who watches what? All the discrepancies between who watches what. What I see may be different from what someone else might interpret on the ISR… ISR is not reliable; it is simply a video platform.’

He was talking specifically about the multiple lines of communication (and hence bases for interpretation) within his Operations Center: now multiply that across sites scattered across Afghanistan and the continental United States and it becomes clear that the contemporary ‘fog of war’ may be as much the result of too much information as too little.

To be continued.