Angry Eyes (2)

MAP isaf-rc-south

This is the second installment of my analysis of an air strike orchestrated by a Predator in Uruzgan province, Afghanistan on 21 February 2010; the first installment is here.

(4) Command and control?

What was happening in and around Khod was being followed not only by flight crews and image analysts in the continental United States but also by several Special Forces command posts or Operations Centers in Afghanistan.  In ascending order these were:

(1) the base from which ODA 3124 had set out at Firebase Tinsley (formerly known as Cobra);

(2) Special Operations Task Force-12 (SOTF-12), based at Kandahar;

(3) Combined Joint Special Operations Task Force – Afghanistan (CJSOTF-A) based at Bagram.

GREGORY Angry Eyes 2015 IMAGES.064

Once the ODA 3124 left the wire, command and support passed to SOTF-12; the OD-B at Tinsley had limited resources and limited (and as it happens intermittent) communications access and could only monitor what was happening.

That was normal, but in fact both higher commands did more or less the same: and the investigating team was clearly appalled.  At SOTF-12 all senior (field grade) officers were asleep during the period of ‘highest density of risk and threatening kinetic activity’ (although they had established ‘wake-up criteria’ for emergency situations).  The Night Battle Captain had been in post for just three weeks and had been given little training in his role; he received a stream of SALT reports from the Ground Force Commander of ODA 3124 (which detailed Size of enemy force, Activity of enemy force, Location and Time of observation) but simply monitored the developing situation – what one investigating officer characterised as ‘a pretty passive kind of watching’.

GREGORY Angry Eyes 2015 IMAGES.065

The same was true at CJSOTF-A (the staff there monitored 15-25 missions a day, but this was the only active operation that had declared a potential Troops in Contact).

When the more experienced Day Battle Captain entered the Joint Operations Center at Kandahar and was briefed by the Night Battle Captain he was sufficiently concerned to send a runner to ask the Judge Advocate, a military lawyer, to come to the JOC.  He believed the occupants of the vehicles were hostile but was not convinced that they posed an immediate threat to troops on the ground:  ‘I wanted to hear someone who was extremely smart with the tactical directive and use of CAS [Close Air Support] in a situation I hadn’t seen before’.

This was a smart call for many reasons; the commander of US Special Forces, Brigadier General Edward Reeder, told the inquiry: ‘Honestly I don’t take a shit without one [a JAG], especially in this business’.  Significantly, the Safety Observer at Creech testified that there was no ‘operational law attorney’ available onsite for aircrews conducting remote operations; conversely, JAGs were on the operations floor of CENTCOM’s Combined Air and Space Operations Centre at Ul Udeid Air Base and, as this case shows, they were available at operations centers established by subordinate commands in-theatre.

GREGORY Angry Eyes 2015 IMAGES.073

GREGORY Angry Eyes 2015 IMAGES.074

The JAG at Kandahar was not routinely called in for ‘Troops in Contact’ but on this occasion he was told ‘my Legal Opinion [was] needed at the OPCENT and that it wasn’t imminent but they wanted me to rush over there right away…’

Meanwhile up at Bagram Colonel Gus Benton, the commanding officer of CJSOTF-A, was being briefed by his second-in-command who understood that the Ground Force Commander’s intention was to allow the three vehicles to move closer to his position at Khod.  He thought that made sound tactical sense.

‘I said that … is what we did, we let them come to us so we can get eyes on them. During my time I never let my guys engage with CAS if they couldn’t see it. I said that is great and COL [Benton] said “that is not fucking great” and left the room.’

At 0820, ten minutes after the JAG entered the JOC at Kandahar, while he was watching the Predator feed, the phone rang: it was Benton.  He demanded Lt Colonel Brian Petit, the SOTF-12 commander, be woken up and brought to the phone:

GREGORY Angry Eyes 2015 IMAGES.076

He spectacularly mis-read the situation (not least because he mis-read the Predator feed).  It was true that the vehicles were in open country, and not near any compounds or villages; but Benton consistently claimed that the vehicles were ‘travelling towards our objective’ whereas – as MG McHale’s investigating team pointed out to him – they were in fact moving away from Khod.

GREGORY Angry Eyes 2015 IMAGES.077

GREGORY Angry Eyes 2015 IMAGES.078

There had also been some, inconclusive discussion of a possible ‘High Value Target’ when the vehicles were first tracked, but the presence of a pre-approved target on the Joint Prioritised Effects List (Benton’s ‘JPEL moving along this road’) had never been confirmed and the Ground Force Commander had effectively discarded it (‘above my authority’, he said).

Certainly, the JAG at Kandahar read the situation differently:

GREGORY Angry Eyes 2015 IMAGES.075

When Benton rang off, the JAG went over to the Day Battle Captain and Lt Col Petit and recommended an Aerial Vehicle Interdiction (AVI) team be called in for a show of force to stop the vehicles without engaging the occupants in offensive action.

They agreed; in fact another Task Force also watching the Predator feed called to make the same suggestion, and the Fires Officer set about arranging to use their Apache helicopters to conduct an AVI:

GREGORY Angry Eyes 2015 IMAGES.079

The Fires Officer had been responsible for setting up the Restricted Operating Zone for aircraft supporting the ODA – de-conflicting the airspace and establishing what aircraft would be available – but its management was de-centralised:

‘I establish the ROZ, give the initial layout of what assets are going on, and then I pass that to the JTAC [Joint Terminal Attack Controller with the Ground Force Commander at Khod].  I pass the frequencies to the assets and the JTAC controls them from there.’

At 0630, long before all this frantic activity at Kandahar, the two OH-58s had arrived at a short hold location beyond the ‘range of enemy visual and audio detection’, and at 0730 they had left to refuel at Tarin Kowt.  The Day Battle Captain and the Fires Officer both thought they were still off station.  In fact, the helicopters had returned to hold at Tinsley/Cobra at 0810 and flat pitched to conserve fuel (which means they landed and left the rotor blades spinning but with no lift); thirty minutes later the JTAC called them forward and the Predator began to talk them on to the target.

The Day Battle Captain had another reason for thinking he and his colleagues in the JOC had more time.  He maintained that the helicopters had been brought in not to engage the three vehicles but to provide air support if and when the ‘convoy’ reached Khod and the precautionary ‘AirTic’ turned into a real TIC or Troops in Contact:

‘… the CAS brought on station for his [the Ground Force Commander’s] use was not for the vehicles but for what we thought was going to be a large TIC on the objective. The weapons team that was pushed forward to his location was not for the vehicles, it was for the possibility of a large TIC on the objective based on the ICOM chatter that we had.’

That chimes with Benton’s second-in-command at Bagram, who also thought the Ground Force Commander was waiting for the ‘convoy’ to reach Khod, but neither witness explained the basis for their belief.  It was presumably a string of transmissions from the JTAC to the Predator crew: at 0538 he told them the Ground Force Commander wanted to ‘keep tracking them and bring them in as close as we can until we have CCA up’ (referring to the Close Combat Attack helicopters, the OH-58s); shortly before 0630 he confirmed that the Ground Force Commander’s intent was to ‘permit the enemy to close, and we’ll engage them closer when they’re all consolidated’; and at 0818 he was still talking about allowing the vehicles to ‘close distance.’

Yet this does not account for the evident urgency with which the Day Battle Captain and the JAG were concerned to establish ‘hostile intent’ and ‘immediate threat’.  When the vehicles were first spotted they were 5 km from Khod, and when they were attacked they were 12 km away across broken and difficult terrain: so what was the rush if the Ground Force Commander was continuing to exercise what the Army calls ‘tactical patience’ and wait for the vehicles to reach him and his force?

In fact, the messages from the Ground Force Commander had been mixed; throughout the night the JTAC had also repeatedly made it clear that the ODA commander’s intent was ‘to destroy the vehicles and the personnel’.  The Ground Force Commander insisted that ‘sometime between 0820 and 0830’ he sent a SALT report to SOTF-12 to say that he was going to engage the target.  Unfortunately there is no way to confirm this, because SOTF’s text records of the verbal SALT reports stopped at 0630 for reasons that were never disclosed (or perhaps never pursued), but it would explain why the JTAC’s log apparently showed the JAG contacting him at 0829 to confirm there were no women and children on the target.  It would also account for testimony by one of the screeners, who realised that the helicopters were cleared to engage at 0835, ten minutes before the strike, when the NCO responsible for monitoring the Predator feed at SOTF-12 ‘dropped’ into the ‘ISR’ (I presume the relevant chat room window), and in response:

‘The MC [Mission Intelligence Co-ordinator at Creech] passed that the OH58 were cleared to engage the vehicles. We were all caught off guard… It seemed strange because we had called out that these vehicles were going west. I don’t know how they determined these vehicles to be hostile… I brought up a whisper [private chat] with the MC, I said are you sure, what are the time frames when they will be coming in, and the MC responded saying we don’t know their ETA and at that moment the first vehicle blew up…’

Should those watching the events unfold have been taken aback when the vehicles were attacked?  According to the pilot of the Predator, he and his crew were surprised at the rapid escalation of events:

‘The strike ultimately came a little quicker than we expected…. we believed we were going to continue to follow, continue to pass up feeds… When he decided to engage with the helos when they did, it happened very quickly from our standpoint. I don’t have a lot of info or situational awareness of why the JTAC decided to use them when they did. When they actually came up … the JTAC switched me on frequencies. So we weren’t talking on the frequency I was talking to him on a different frequency to coordinate with the helos.

But their surprise was as nothing compared to the reaction of most observers when the first vehicle exploded.  The officer in charge of the screeners and imagery analysts who had been scrutinising the Predator feed at Air Force Special Operations Command at Hurlburt Field in Florida couldn’t believe it:

GREGORY Angry Eyes 2015 IMAGES.088

The Day Battle Captain testified:

‘I did not feel that the ground force commander would use any kind of close air support whatsoever to engage those vehicles… Based on the information that I had and looking at the vehicles move away it did not appear that they were moving towards the ground forces…

… as we were watching the Predator feed the first vehicles exploded. And everyone in the OPSCEN was immediately shocked… The amount of time from when that course of action approved by the SOTF commander to when we actually saw the strike occur there was no time, there was not adequate time to inform the ground commander that that was the course of action decided by the CJSOTF commander… I have phones ringing left and right, talking to people, trying to explain things, you know we look up on the screen and it happened…’

GREGORY Angry Eyes 2015 IMAGES.089

The Fires Officer:

‘I don’t think at any time anyone communicated to the GFC [Ground Force Commander] not to strike these vehicles because it is not something that we normally do. We feel that if he is in contact with the Predator and the OH-58s that we sent out to screen which we were not aware of and he is on the ground he generally has a pretty good picture of what is going on. He might be more privy to some conversation that he had with the OH-58 than what we know about. We normally give the GFC pretty big leeway on how they operate and the same with the JTAC because he has control of the assets and I am not going to try to take his assets away.’

In short, the investigation concluded that the Ground Force Commander never knew that an Aerial Vehicle Interdiction was being arranged, and neither of his higher commands were aware that he had cleared the helicopters to attack the three vehicles.

But, as I will show next, what lay behind these failures of communication was a de-centralised, distributed and dispersed geography of militarised vision whose fields of view expanded, contracted and even closed at different locations engaged in the administration of military violence.  Far from being a concerted performance of Donna Haraway‘s ‘God-trick’ – the ability to see everything from nowhere – this version of networked war was one in which nobody had a clear and full view of what was happening.

Part of this can be attributed to technical issues – the different fields of view available on different platforms, the low resolution of infra-red imagery (which Andrew Cockburn claims registers a visual acuity of 20/200, ‘the legal definition of blindness in the United States’), transmission interruptions, and the compression of full-colour imagery to accommodate bandwidth pressure.  So for example:

GREGORY Angry Eyes 2015 IMAGES.125

But it is also a matter of different interpretive fields.  Peter Asaro cautions:

‘The fact that the members of this team all have access to high-resolution imagery of the same situation does not mean that they all ‘‘see’’ the same thing. The visual content and interpretation of the visual scene is the product of analysis and negotiation among the team, as well as the context given by the situational awareness, which is itself constructed.’

The point is a sharp one: different visualities jostle and collide, and in the transactions between the observers the possibility of any synoptic ‘God-trick’ disappears.  But it needs to be sharpened, because different people have differential access to the distributed stream of visual feeds, mIRC and radio communications.  Here the disposition of bodies combines with the techno-cultural capacity to make sense of what was happening to fracture any ‘common operating picture’.   As one officer at Kandahar put it:

‘We didn’t have eyes on, minus ISR platform, that we can all see, who watches what? All the discrepancies between who watches what. What I see may be different from what someone else might interpret on the ISR… ISR is not reliable; it is simply a video platform.’

He was talking specifically about the multiple lines of communication (and hence bases for interpretation) within his Operations Center: now multiply that across sites scattered across Afghanistan and the continental United States and it becomes clear that the contemporary ‘fog of war’ may be as much the result of too much information as too little.

To be continued.

Visualising the invisible

The latest issue of Wired has a simply schematic map of ‘an invisible but vast war zone’ created by cyberattacks:

Cyberattacks mapped

Every month, it seems, a mammoth cyberattack sponsored by a nation state comes to light. In recent years, more than 20 countries have announced their intent to launch or beef up their offensive cyber capabilities. The result is a burgeoning digital arms race that presents a major threat to the security of our data.

But they are very late to the game (and there are also many internal threats to ‘the security of our data’: think NSA or GCHQ).  In October 2013 Google Ideas in collaboration with Arbor Networks launched an interactive map of daily Distributed Denial of Service (DDoS) attacks that attempt to make an online service unavailable by overwhelming it with traffic from multiple sources :

Digital attacks 29 September 2015

According to Arbor Networks,

Attackers build networks of infected computers, known as ‘botnets’, by spreading malicious software through emails, websites and social media. Once infected, these machines can be controlled remotely, without their owners’ knowledge, and used like an army to launch an attack against any target. Some botnets are millions of machines strong.  Botnets can generate huge floods of traffic to overwhelm a target. These floods can be generated in multiple ways, such as sending more connection requests than a server can handle, or having computers send the victim huge amounts of random data to use up the target’s bandwidth. Some attacks are so big they can max out a country’s international cable capacity.  Specialized online marketplaces exist to buy and sell botnets or individual DDoS attacks. Using these underground markets, anyone can pay a nominal fee to silence websites they disagree with or disrupt an organization’s online operations. A week-long DDoS attack, capable of taking a small organization offline can cost as little as $150.

I discussed these, and connected them to militarised cyberattacks in ‘The everywhere war’ [DOWNLOADS tab].

The site provides an illuminating typology of attacks – TCP connection attacks that attempt to use up all available connections; Volumetric attacks that use up bandwidth; Fragmentation attacks that send a flood of TCP or UDP fragments to a victim, overwhelming their ability to re-assemble the streams and severely reducing performance; and Application attacks that target applications.

There is also an instructive gallery of major attacks:

Gallery of major attacks

And in 2014 another internet security company, Norse, released a live stream of origins and targets of attack; I’ve pasted a screenshot below but there is also a YouTube video here.

NORSE Digital attacks

The image above — which looks like Missile Command on steroids — shows just a snippet of hacking attempts around the world, the countries from which they originate, and the countries that they are attacking.

In reality, the attackers are hitting what Norse calls honey pots — special traps designed to detect unwanted network intrusions by hackers. It’s important to note that the location an attack comes from isn’t necessarily its true origin, as hackers can make an attack look like it’s coming from one place when it’s really coming from another.

You can find a list of other cyber attack maps at CTF365 here.

‘The superpower’s dilemma’

I’m on the magical island of Sicily for the 9th Pan-European Conference on International Relations: Worlds of Violence (you can find abstracts and even some papers here though presumably not for ever).

I’ve never been to one of these things before, not even the ISA (though I must do something about that) so there’s a  learning curve – not only about IR but about how people in a different field who all seem to know one another comport themselves (or don’t).  There are lots of geographers here too, though Philippe Le Billon and Simon Springer, who organised a series of sessions on Geographies of Violence, never made it (fortunately not felled by violence).

I’m giving what I hope is more or less the final version of ‘Angry Eyes‘ (updates here and here) on the Uruzgan drone strike so I’ve been attending several sessions on drones to see what other analysts have been up to beyond the range of my targeting sensors trained on ssrn and Academia [This is perhaps the place to say I don’t post anything on either platform, since all my texts are available on this website under DOWNLOADS: but maybe I should?].

web-syria-drone-epa

Yesterday Lisa Hajjar spoke on ‘Drone warfare and the superpower’s dilemma‘.  She explains the title like this:

The United States has been in a continuous—or, at least, uninterrupted—state of armed conflict since 2001, and there is no end in sight. The strategies and technologies, as well as the locales of engagement and designated enemies of this “’global’ war on terror” have changed considerably over the past fourteen years. Nevertheless, the US government still relies on the Authorization for Use of Military Force (AUMF), passed by Congress on 14 September 2001 (three days after the 9/11 terrorist attacks), as the legal authority to bomb people in Afghanistan, Pakistan, Yemen, and Somalia, in Iraq since the occupation (the 2003 invasion was authorized under a different AUMF), in Libya since 2012, and most recently in Syria. This expanding conflict is not actually the same in any empirical sense, but the 2001 AUMF continues to be relied on because of the plasticity of the label of terrorism and the fact that the war against it has neither been won nor lost. This ability to continue fighting without losing and the inability to stop without winning could be described as “the superpower’s dilemma.”

‘The most significant change over the course of the “war on terror”’, she continues, ‘is the escalating use of armed drones (unmanned aerial vehicles, or UAVs) to target geographically diffuse and unconventional enemies.’

My analysis highlights three main issues: 1) why drone strikes for targeted killing have superseded capture and combat in US counter-terrorism strategy; 2) how officials explain and justify the strategic logic of remote killing; and 3) why drones seem to provide a technological answer to the superpower dilemma of how the United States can continue to “stay in the fight” without a significant commitment of “boots on the ground.” The conclusion is that bombing operations and aerial campaigns are incapable of achieving the declared security goals that their use aims to serve. On the contrary, drone warfare has been an important factor in the continuation of the “war on terror.”

My ability to report all this is not down to phenomenal powers of recall or a crash course in shorthand: you can read the full essay in two parts at Jadaliyya here and here.

(If you wonder about the image above, by the way, you can find the answer to its symbolic significance here and here).

_85425907_raf_strike_grab_976

Meanwhile, other states are operating drones too – notably over Iraq and Syria – including Russia (more here and here) and the UK (see here and read here).  I’m keeping my eyes on those developments too, but right now it’s Angry Eyes that holds my attention (not least because it reminds us that military drones are used for far more than targeted killing).  There are discussants for my own presentation, so I’ve prepared a paper summarising the argument and conclusions in lieu of a real paper – the long-form version is still in preparation – and I’ll post that soon.  But now I must away to think myself into my part….

Reach from the Sky

Tanner_V2

I’ve been invited to give the annual Tanner Lectures in Cambridge on 13-14 January 2016. The Lectures are given in parallel at nine universities in the UK and the USA: Cambridge, Oxford, Harvard, Princeton, Stanford, Yale, Berkeley, Michigan and Utah.

Appointment as a Tanner lecturer is a recognition for uncommon achievement and outstanding abilities in the field of human values. The lecturers may be elicited from philosophy, religion, the humanities, the sciences, the creative arts, and learned professions, or from leadership in public or private affairs. The lectureships are international and intercultural and transcend ethnic, national, religious, and ideological distinctions.

The purpose of the Tanner Lectures is to advance and reflect upon the scholarly and scientific learning relating to human values. This intention embraces the entire range of values pertinent to the human condition, interest, behavior, and aspiration. The lectures are published in an annual volume.

The Tanner Lectures were established by the American scholar, industrialist, and philanthropist, Obert Clark Tanner. In creating the lectureships, Professor Tanner said, “I hope these lectures will contribute to the intellectual and moral life of mankind. I see them simply as a search for a better understanding of human behavior and human values. This understanding may be pursued for its own intrinsic worth, but it may also eventually have practical consequences for the quality of personal and social life.”

It’s a huge honour, and thoroughly intimidating when I look at the roster of previous speakers and those delivering the other lectures in 2015-16, and I’m thrilled – though so far I’ve only got as far as a title: ‘Reach from the Sky: aerial violence and the everywhere war‘.  The clock is ticking, so watch this space for progress reports…

Little Boys and Blue Skies

These are very preliminary notes and ideas for my presentation at “Through Post-Atomic Eyes” in Toronto next month: I would really – really – welcome any comments, suggestions or advice.  I don’t usually post presentations in advance, and this is still a long way from the finished version, but in this case I am venturing into (irradiated) fields unknown to me until a few months ago…

CHOMSKY On Western terrorismAt first sight, any comparison between America’s nuclear war capability and its drone strikes in Afghanistan, Iraq, Pakistan, Somalia, Syria and Yemen seems fanciful. The scale of investment, the speed and range of the delivery systems, the nature of the targets, the blast radii and precision of the munitions, and the time and space horizons of the effects are so clearly incommensurable. It’s noticeable that the conversation between Noam Chomsky and Andre Vltchek published as On Western Terrorism: from Hiroshima to drone warfare (2013) says virtually nothing about the two terms in its subtitle.

Yet nuclear weapons and drone strikes have both been attended by intense diplomatic, geopolitical and geo-legal manoeuvres, they have both sparked major oppositional campaigns by activist organisations, and they have both had major impacts on popular culture (as the two images below attest).

dr-strangelove-still-580

President-Strangelove

But there are other coincidences, connections and transformations that also bear close critical examination.

When Paul Tibbets flew the Enola Gay across the blue sky of Hiroshima on 6 August 1945 one of his major concerns was to execute a fast, tight 155 degree turn to escape the effects of the blast from ‘Little Boy’.  There is some dispute over the precise escape angle – there’s an exhaustive discussion in the new preface to Paul Nahin‘s Chases and escapes: the mathematics of pursuit and evasion (second edition, 2007) – but the crucial point is the concern for the survival of the aircraft and its crew.

Enola Gay co-pilot [Robert Lewis]'s sketch after briefing of approach and 155 turn by the B-29s weaponeer William Parsons, 4 August 1945

Tibbets successfully made his escape but four years later, when the US Atomic Energy Commission was developing far more powerful bombs, the Air Force became convinced that escape from those blasts would be impossible. And so it implemented Project Brass Ring which was intended to convert B-47 Stratojet bombers into remotely-piloted aircraft capable of delivering atomic bombs without any loss of American lives.  (What follows is taken from Delmer Trester, ‘Thermonuclear weapon delivery by unmanned B-47: Project Brass Ring‘; it was included in A history of the Air Force Atomic Energy Program, 1949-1953, which can be downloaded here; you can obtain a quick overview here).

‘It appeared that the Air Force would need some method to deliver a 10,000-pound package over a distance of 4,000 nautical miles with an accuracy of at least two miles from the center of the target. It was expected the package would produce a lethal area so great that, were it released in a normal manner, the carrier would not survive the explosion effects. Although not mentioned by name, the “package” was a thermonuclear device – the hydrogen or H-bomb…

B-47 Stratojet bomber (USAF)

‘The ultimate objective was to fashion a B-47 carrier with completely automatic operation from take-off to bomb drop… The immediate plan included the director B-47A aircraft as a vital part of the mission. Under direction from the mother aircraft, the missile would take off, climb to altitude and establish cruise speed conditions. While still in friendly territory, the crew aboard the director checked out the missile and committed its instruments to automatically accomplish the remainder of the mission. This was all that was required of the director. The missile, once committed, had no provision for returning to its base… either the B-47 became a true missile and dived toward the target … or a mechanism triggered the bomb free, as in a normal bombing run.’

This was a re-run of Operation Aphrodite, a failed series of experiments carried out in the closing stages of the Second World War in Europe, and – as the images below show – after the war the Air Force had continued to experiment with B-17 aircraft remotely piloted from both ‘director aircraft’ [top image; the director aircraft is top right] and ‘ground control units’ [bottom image].  These operated under the aegis of the Air Force’s Pilotless Aircraft Branch which was created in 1946 in an attempt to establish the service’s proprietary rights over missile development.

B-17 drones

Ground control unit for B-17 drone

But the Brass Ring team soon discovered that their original task had swelled far beyond its original, taxing specifications: in October 1951 they were told that ‘the super-bomb’ would weigh 50,000 lbs. They modified their plans (and planes) accordingly, and after a series of setbacks the first test flight was successful:

‘The automatic take-off, climb and cruise sequence was initiated remotely from a ground control station. The aircraft azimuth, during take-off, was controlled by an auxiliary control station at the end of the runway. Subsequent maneuvers, descent and landing (including remote release of a drag parachute and application of brakes) were accomplished from the ground control station. The test was generally satisfactory; however, there were several aspects – certain level flight conditions, turn characteristics and the suitability of the aircraft as a “bombing platform” – which required further investigation.’

This was part of a larger imaginary in which, as Life had commented in its issue of 20 August 1945, echoing USAAF General Henry H. ‘Hap’ Arnold, ‘robot planes … and atomic bombs will do the work today done by fleets of thousands of piloted bombers.’ (Arnold thought this a mixed blessing, and in an essay ghost-written with William Shockley he noted that nuclear weapons had made destruction ‘too cheap and easy’ – one bomb and one aircraft could replace hundreds of bombs and vast fleets of bombers – and a similar concern is often raised by critics of today’s Predators and Reapers who argue that their remote, often covert operations have lowered the threshold for military violence).

Henry H Hap Arnold.001

Brass Ring was abandoned on 13 March 1953, once the Air Force determined that a manned aircraft could execute the delivery safely (at least, for those on board).  It would be decades before another company closely associated with nuclear research – General Atomics (more here) – supplied the US Air Force with its first MQ-1 Predators.

1994-august

These were originally conceived as unarmed, tactical not strategic platforms, designed to provide intelligence, surveillance and reconnaissance for conventional strike aircraft. But the concern with American lives became a leitmotif of both programs, and one of the foundations for today’s remote operations is the ability (as the USAF has it) to ‘project power without vulnerability’.

BOYER By the bomb's early lightThe visible effects of bombing Hiroshima and Nagasaki on the Japanese population were the subject of strict censorship – still photographs were never published, while Japanese media and even US military film crews had their documentary footage embargoed – and public attention in the United States was turned more or less immediately towards visualising ‘Hiroshima USA’ (Paul Boyer is particularly good on this; there are also many images and a good discussion here). Even the US Strategic Bombing Survey indulged in the same speculation: ‘What if the target for the bomb had been an American city?’ it asked in its June 1946 report. ‘The casualty rates at Hiroshima and Nagasaki, applied to the massed inhabitants of Manhattan, Brooklyn, and the Bronx, yield a grim conclusion.’ Although the original targets had been Asian cities it was American cities that were designated as future victims.  ‘Physically untouched by the war’ (apart from Pearl Harbor), Boyer wrote,

‘the United States at the moment of victory perceived itself as naked and vulnerable.  Sole possessors and users of a devastating instrument of mass destruction, Americans envisioned themselves not as a potential threat to other peoples, but as potential victims.’

This was the abiding anxiety instilled by the national security state and orchestrated through its military-industrial-media-entertainment complex throughout the post-war decades.  Perhaps the most famous sequence of images – imaginative geographies, I suppose –accompanied an essay by John Lear in Collier’s Magazine in August 1950, ‘Hiroshima USA: Can anything be done about it?‘, showing a series of paintings by Chesley Bonestell and Birney Lettick imagining the effects of a nuclear strike on New York:

Hiroshima USA 11950-aug-6-colliers-p12-sm

Similar sequences, often accompanied by maps, were produced for many other cities (and the simulations continue: see, for example, here).  The images below, from Life on 19 November 1945, come from ‘The 36-Hour War’ (see here for a commentary) that envisaged a nuclear attack on multiple cities across the USA, including Washington DC, from (presumably Soviet) ‘rocket-launching sites [built] quickly and secretly in the jungle’ of equatorial Africa:

1945-Life-36-Hour-War-2

1945-Life-36-Hour-War-1

Schlosser-Command-and-Control-bookAs it happened, American cities did indeed become targets – for the US Air Force.  According to Eric Schlosser, under General Curtis Le May the goal was

to build a Strategic Air Command that could strike the Soviet Union with planes based in the United States and deliver every nuclear weapon at once. SAC bomber crews constantly trained and prepared for that all-out assault. They staged mock attacks on every city in the United States with a population larger than twenty-five thousand, practicing to drop atomic bombs on urban targets in the middle of the night. San Francisco was bombed more than six hundred times within a month.

VANDERBILT Survival CityTests were also conducted at the Nevada Proving Ground, ‘the most nuclear-bombed place on the planet’, to determine the likely effects.  One of the purposes of the Strategic Bombing Survey’s Physical Damage Division had been to document the effects of the bombs on buildings in Hiroshima and Nagasaki – to read them as ‘blueprints for the atomic future‘ – and both Japanese and American medical teams had been sent in shortly after the blasts to record their effects on bodies (from 1947 their work was subsumed under the Atomic Bomb Casualty Commission).  It was now imperative bring the two together and to bring their results home.  And so, starting in 1953 with ‘Operation Doorstep’, mannequins were placed inside single-family houses at the Nevada site to calculate the prospects for the survival of what Joseph Masco calls the American ‘nuclearised’ family in the event of a nuclear attack; they subsequently went on public exhibition around the country with the tag line:

‘These mannikins could have been real people; in fact, they could have been you.’

In the Second World War experimental bombing runs had been staged against mock German and Japanese targets at the Dugway Proving Ground but – significantly – the buildings had no occupants: as Tom Vanderbilt wryly remarks, now ‘the inhabitants had been rewritten into the picture’ because the objective was to calibrate the lives of Americans.

Rachele Riley Mannequins

I have borrowed this image from the mesmerising work of artist Rachele Riley, whose project on The evolution of silence centres on Yucca Flat in the Nevada Test Site and raises a series of sharp questions about both the imagery and the soundscape of the nuclear age.

The power of the image – ‘the nuclear sublime’ – was one of the central objectives of the attacks on Hiroshima and Nagasaki: ‘the weapon’s devastating power had to be seen to be believed,’ as Kyo Maclear observed, and it had to be seen and believed in Moscow as well as in Tokyo.  Here the visual economies of nuclear attacks are radically different from drone strikes. In the immediate aftermath there was no shortage of atomic ‘views from the air’ –  aerial photographs of the vast cloud towering into the sky and of Hiroshima before and after the bomb.  Here is Life (sic) on 20 August 1945:

LIFE:Hiroshima 1

LIFE:Hiroshima 2LIFE:Hiroshima 3

Yet for the most part, and with some significant exceptions, aerial views are singularly absent from today’s drone wars. To Svea Braeunert (‘Bringing the war home: how visual artists return the drone’s gaze‘) that is all the more remarkable because drone strikes are activated by what video artist Harun Farocki called operative images: but that is also the reason for the difference. Aerial photographs of Hiroshima or Nagasaki reveal a field of destruction in which bodies are conspicuously absent; the resolution level is too coarse to discern the bomb’s victims.

But the video feeds from a Predator or Reaper, for all their imperfections, are designed to identify (and kill) individuals, and their aerial gaze would – if disclosed – reveal the bodies of their victims. That is precisely why the videos are rarely released (and, according to Eyal Weizman, why satellite imagery used by investigators to reconstruct drone strikes is degraded to a resolution level incapable of registering a human body – which remains ‘hidden in the pixels‘ – and why their forensic visual analysis is forced to focus on buildings not bodies).

OMAR FAST %000 Feet is Best

One might expect visual artists to fill in the blank. Yet – a further contrast with Hiroshima – apart from projects like Omar Fast’s ‘5,000 Feet is Best’ (above) and Thomas van Houtryve’s ‘Blue Sky Days’ (below) there have been precious few attempts to imagine drone strikes on American soil.

van HOUTRYVE Blue Sky Days

Perhaps this is because they are so unlikely: at present these remote platforms can only be used in uncontested air space, against people or states who are unable (or in the case of Pakistan, unwilling) to defend themselves. But there has been a protracted debate about such strikes on American citizens (notably the case of Anwar al-Awlaki) and a concerted attempt to focus on the rules followed by the CIA and JSOC in their programs of targeted killing (which has artfully diverted public attention to Washington and away from Waziristan).

There is also a visceral, visible continuity between the two: just as in Hiroshima and Nagasaki, there has been little public concern over the victims of drone strikes, the vast majority of whom have once again been Asian.

If the targeting process continues to be racialised, it also continues to be bureaucratised. After the Second World War the US Air Force was determined to speed up its targeting cycle, and in 1946 started to compile a computerised database of potential targets in the Soviet Union; this was soon extended to Soviet satellites and Korea, and by 1960 the Bombing Encyclopedia of the World (now called the ‘Basic Encyclopedia’) contained 80,000 Consolidated Target Intelligence Files. These were harvested to plan Strategic Air Command’s nuclear strikes and to calibrate Damage and Contamination Models. One of the analysts responsible for nominating targets later described the process as ‘the bureaucratisation of homicide’. Similar criticisms have been launched against the ‘disposition matrix’ used by the CIA to nominate individuals authorised for targeted killing (see here and here); most of these are in Pakistan, Somalia, and Yemen, though there are other kill lists, including Joint Prioritised Effects Lists compiled by the US military for war zones in Afghanistan and Iraq. In both cases the target files are in principle global in reach, and both nuclear strikes and targeted killings (outside established war zones) are judged to be sufficiently serious and ‘sensitive’ to require direct Presidential approval.

Speeding up the targeting cycle has involved more than the pre-emptive identification of targets. In contrast to the fixed targets for nuclear strikes, today’s Predators and Reapers are typically directed against mobile targets virtually impossible to locate in advance. Pursuing these fleeting ‘targets of opportunity’ relies on a rapidly changing and expanding suite of sensors to identify and track individuals in near-real time. In 2004 the Defense Science Board recommended the Pentagon establish ‘a “Manhattan Project”-like program for ID/TTI’ [identification, tagging, tracking and locating], and one year later a Technical Advisor working for the National Security Agency’s Target Reconnaissance and Survey Division posed the following question:

NSA's Little Boy

The onboard sensor suite in the pod has since become ever more effective in intercepting and monitoring electronic communications as part of a vast system of digital data capture, but Predators had already been armed with Hellfire missiles to compress the kill-chain still further, and to many commentators the most radical innovation in later modern war has been the fusion of sensor and shooter in a single platform. The new integrated systems were first trialled – on a Predator flown by test pilots from General Atomics – in February 2000 at Indian Springs Auxiliary Field. The main objective was to hunt and kill Osama bin Laden, and at the request of the Air Force and the CIA a series of tests was carried out.

First, the Air Force wanted to determine whether the Predator could withstand a missile being fired from beneath its insubstantial wings (a ghostly echo of earlier anxieties over the survivability of the Enola Gay and its successors – though plainly much reduced by the absence of any pilot on board).

Second, the CIA wanted to assess the likely effects of a Hellfire strike on the occupants of a single-storey building like those found in rural Afghanistan (nuclear tests had used mannequins and pigs as human surrogates; these used plywood cut-outs and watermelons).

predatorBoth sets of tests were eventually successful (see also here) but, as Richard Whittle shows in consummate detail, a series of legal and diplomatic obstacles remained. In order to secure satellite access over Afghanistan, previous Predator flights to find bin Laden had been flown from a ground control station at Ramstein Air Base in Germany. But using a Predator to kill bin Laden was less straightforward. After protracted debate, US Government lawyers agreed that a Predator armed with a missile would not violate the 1987 Intermediate-Range Nuclear Forces Treaty, which eliminated nuclear and conventional missiles with intermediate ranges but which – unhelpfully for the CIA – defined missiles as ‘unmanned, self-propelled … weapon-delivery vehicles’; the lawyers determined that the Predator was merely a platform and, unlike a cruise missile, had no warhead so that it remained outside the Treaty. But they also insisted that the Status of Forces Agreement with Germany would require Berlin’s consent for the activation of an armed Predator. (The United States stored tactical nuclear warheads at Ramstein until 2005; although the US insisted it retained control over them, in the event of war they were to have been delivered by the Luftwaffe as part of a concerted NATO nuclear strike).

RAMSTEIN English captions

The need to bring Berlin onside (and so potentially compromise the secrecy of the project) was one of the main reasons why the ground control station was relocated to Indian Springs, connected to the satellite link at Ramstein through a fibre-optic cable under the Atlantic:

remote-split-operations-usaf

In fact, since 1952 Indian Springs had been a key portal into the Nevada Test Site – its purpose was to support both US Atomic Energy Commission nuclear testing at the Nevada Proving Grounds and US Air Force operations at the Nellis Air Force Base’s vast Gunnery and Bombing Range – and in June 2005 it morphed into Creech Air Force Base: the main centre from which ‘remote-split’ operations in Afghanistan, Pakistan and elsewhere are flown by USAF pilots. Most of the covert operations are directed by the CIA (some by Joint Special Operations Command), but the Predators and Reapers are used for more than targeted killing; the primary missions are still to provide ISR for conventional strikes and now also close air support for ground troops.

Wfm_area51_map_en

The geographies overlap, coalesce and – even allowing for the differences in scale – conjure up a radically diffuse and dispersed field of military violence.  When Tom Vanderbilt described ‘a war with no clear boundaries, no clear battlefields … a war waged in such secrecy that both records and physical locations are often utterly obscured’ he was talking about nuclear war.  But exactly the same could be said of today’s drone wars, those versions of later modern war in which the body becomes the battle space (‘warheads on foreheads’) and the hunting ground planetary: another dismal iteration of the ‘everywhere war’ (see here and here).

For all these connections and intersections, a key divide is the issue of civilians and casualties. On 9 August 1945 President Truman (below) described Hiroshima as a ‘military base’ selected ‘because we wished in this first attack to avoid, insofar as possible, the killing of civilians’.

TRUMAN Hiroshima speech

This was simply untrue, and similar – often no less deceptive – formulations are routinely used to justify US drone strikes and to minimise what is now called ‘collateral damage’. Still, the scale of civilian casualties is clearly different: usually dozens rather than hundreds of thousands.

And yet, there is something irredeemably personal and solitary about the response to death from either cause; parents searching for the bodies of their children in the ruins are as alone in Dhatta Khel as they were in Hiroshima.  When Yukiko Hayashi [her real name is Sachiko Kawamura] describes the anguish of a young woman and her father finding the remains of their family – the poem, ‘Sky of Hiroshima‘, is autobiographical – it is surely not difficult to transpose its pathos to other children in other places:

Daddy squats down, and digs with his hands
Suddenly, his voice weak with exhaustion, he points
I throw the hoe aside
And dig at the spot with my hands
The tiles have grown warm in the sun
And we dig
With a grim and quiet intent

Oh…
Mommy’s bone
Oh…
When I squeezed it
White powder danced in the wind
Mommy’s bone
When I put it in my mouth
Tasted lonely
The unbearable sorrow
Began to rise in my father and I
Left alone
Screaming, and picking up bones
And putting them into the candy box
Where they made a rustle

My little brother was right beside my mommy
Little more than a skeleton
His insides, not burnt out completely
Lay exposed…

NOOR BEHRAM Orphans Dande Darpa Khel 21 August 2009

MASCO Theater of OperationsIn The Theater of Operations Joseph Masco draws a series of distinctions between the US national security state inaugurated by the first atomic bombs and the counter-terror state whose organs have proliferated since 9/11.

He properly (and brilliantly) insists on the affects instilled in the American public by the counter-terror state as vital parts of its purpose, logic and practice – yet he says virtually nothing about the affects induced amongst the vulnerable populations forced to ‘live under drones’ and its other modes of military and paramilitary violence.

In Waziristan no air raid sirens warn local people of a strike, no anti-aircraft systems protect them, and no air-raid shelters are available for them to seek refuge.

1374361_10151671014096363_1647526274_n

Hence young Zubair Rehman’s (above, top right) heartbreaking admission after a drone killed his grandmother as she tended the fields in Ghundi Kala in North Waziristan (see here and here):

‘I no longer love blue skies. In fact, I now prefer grey skies. The drones do not fly when the skies are grey.’

Art in another age of mechanical destruction

Paglen (Untitled, Predators, Indian Springs)

Anthony Downey‘s beautifully illustrated and generously hyperlinked essay on The legacy of the war on terror for Tate Etc (34) (2015) is here.

For centuries artists have both responded to and reflected on political actions and events that shape society. Now they have risen to the challenge of questioning the moral ambiguity and culpability of governments waging the war on terror, whose methods may, according to this writer, have done more to weaken democracy than any terrorist.

The essay considers the art works of Trevor Paglen (see his Untitled, Predators, Indian Springs, above) Christoph Büchel and Gianni Motti, Ayreen Anastas and Rene Gabri, Gregor Schneider, (see his Passageway No 1 from White Torture below), Wafaa Bilal, Coco Fusco, Hasan Elahi and Gerhard Richter.

20150519_photo1

If you know Anthony’s previous work (for example his essay on ‘Exemplary subjects: Camps and the politics of representation’), or his Art and Politics now (2014), you will not be surprised to find that – as the image above suggests – there’s much in this essay about Guantanamo — but also much more besides.

Here is the Introduction:

In the months after the attacks on the World Trade Centre on 11 September 2001 a significant number of artists and cultural practitioners compared the events, in all their visual impact and operatic pitching of good against evil, with a work of art. These comments were dismissed at the time as reactionary and in bad taste, but they did reveal an imminent desire to develop a degree of distance – be it aesthetic or otherwise – from the emotive, ‘spectacular’ and brutal realities that unfolded on that fateful day. In the months and years that followed, under the political logic of a so-called war on terror, we saw yet another unprecedented attack, this time on the legal systems protecting basic civil rights. The war on terror segued, in short order, into an assault on human rights. For some, terrorism has become the single biggest challenge facing democratically elected governments worldwide. For others, it is the political reaction to it that has done more to weaken democracy than any act of terror.

Executed as it was in the name of justice, the war on terror has resulted in a nominal state of emergency being declared across North America and Europe. Since 2001 we have witnessed the repeated suspension of due legal process, the revocation of constitutional law, the institutionalisation of torture, the withdrawal of civil rights, the deployment of mass surveillance, the routine collection of information on innocent citizens and arbitrary detention without trial for countless people worldwide.

Contemporary artists, in examining the ambiguity of this state of affairs, often create narratives and forms of speculative visual rhetoric that expose the anxieties surrounding these acts.

(In)human Terrain

humanterrain3

It’s been an age since I looked at the US military’s attempt to ‘weaponise culture’ in its counterinsurgency programs (see ‘The rush to the intimate’: DOWNLOADS tab), but Roberto Gonzalez has kept his eyes on the ground – or the ‘human terrain’ (I’ve borrowed the image above from Anthropologists for Justice and Peace here).

In a special report for Counterpunch a month ago, Roberto noted the demise of the Human Terrain System:

The most expensive social science program in history – the US Army’s Human Terrain System (HTS)–has quietly come to an end. During its eight years of existence, the controversial program cost tax payers more than $725 million…

HTS supporters frequently claimed that the program would increase cultural understanding between US forces and Iraqis and Afghans–and therefore reduce American and civilian casualties. The program’s leaders insisted that embedded social scientists were delivering sociocultural knowledge to commanders, but the reality was more complex. HTS personnel conducted a range of activities including data collection, intelligence gathering, and psychological operations. In at least one case, an HTS employee supported interrogations in Afghanistan.

The program also served a more insidious function: It became a propaganda tool for convincing the American public–especially those with liberal tendencies–that the US-led occupations of Iraq and Afghanistan were benevolent missions in which smart, fresh-faced young college graduates were playing a role. It appeared to demonstrate how US forces were engaged in a kinder, gentler form of occupation. Department of Defense photos portrayed HTS personnel sitting on rugs while drinking tea with Afghan elders, or distributing sweets to euphoric Iraqi children. Here was a war that Americans could feel good about fighting.

The program had its critics, inside as well as outside the military, and US Army Training and Doctrine Command (TRADOC) eventually confirmed that HTS had been terminated on 30 September 2014.  In his report, Roberto traces the rise and fall of HTS, and attributes its demise to US troop withdrawals from Iraq and Afghanistan, the fall from grace of the ‘new’ counterinsurgency’s champion David Petraeus, the incompetence of many of the HTS teams, and – crucially – to the precipitate shift from ‘cultural’ to geospatial intelligence.

The last, impelled by the desire to substitute air strikes for ‘boots on the ground’ and to rely on computational methods rather than human intelligence, is the key: as Oliver Belcher put it in his PhD thesis on The afterlives of counterinsurgency, “It’s algorithms, not anthropology, that are the real social science scandal in late-modern war.”

I’ve been exploring this shift in my ‘Dirty Dancing’ essay – in relation to the American production of the Federally Administered Tribal Areas of Pakistan as a space of execution, a code/space in which data surveillance and computational methods are activated to assert an extra-territorial claim over bodies-in-spaces – but it’s become clear to me that this continues to rely on (and in some respects even extends) the weaponisation of culture.  It’s an appropriate metaphor: after all, weapons are inherently dangerous, they can be misdirected, they do misfire and they can cause grievous harm far beyond their intended target.

In a follow-up post on ‘Re-making the Human Terrain’, Roberto says as much:

GONZALEZThe gaps in military knowledge that HTS claimed to fill still remain. The desire to weaponize culture is as old as dreams of counterinsurgency, and such dreams do not die easily.

It would be premature for those concerned about the militarization of culture to breathe a sigh of relief. The needs of empire—especially an empire in denial—are far too great to ignore cultural concerns. HTS’s sudden death can obscure the fact that elements of the program continue to survive, though in distinct and sometimes unrecognizable forms. The basic idea behind HTS—to equip the military with cultural expertise for battlefield operations—has not been eradicated. If anything, the concept has firmly taken root.

He traces its off-shoots through the development of a Global Cultural Knowledge Network – which I can’t help seeing as the cultural version of the Bombing Encyclopedia of the World – and the role of private corporations in providing ‘human terrain analysts’ to support US special operations (see also Max Forte here on what I think of as the Military-Academic-Industrial-Media complex: MAIM).  Interestingly, Whitney Kassel – who is adamant that ‘shuttering HTS will almost certainly be a mistake’ – notes that ‘the National Defense University conducted a detailed study of HTS [summarised in JFQ] in late 2013 and recommended that the function be moved and permanently housed at U.S. Army Special Operations Command … which has the lead for irregular warfare and other Army functions that make the most frequent use of sociocultural knowledge.’

Roberto also provides a more detailed analysis of the US military’s investment in socio-cultural modelling and (this is truly vital) predictive forecasting in two linked essays on ‘Seeing into hearts and minds’: Part 1 is ‘The Pentagon’s quest for a social radar’, Anthropology Today 31 (3) (June 2015) 8-13 and Part 2 is ‘‘Big data’, algorithms, and computational counterinsurgency, Anthropology Today 31 (4) (August 2015) 13-18.

Social Radar JPEG

The second part is most directly relevant to what I’ve been working on because it describes the conceptual development of so-called ‘Social Radar’ (see image above: ‘sensor systems for the 21st century‘; see also here) and the morphing of the NSA’s Real Time Regional Gateway for Iraq – which integrated data surveillance from multiple sources and domains with visual feeds from drones – into Nexus 7 in Afghanistan.

Similar fusion systems have surely been working across the border, and in his Unmanned: drones, data, and the illusion of perfect warfare (2015) William Arkin provides a fascinating glimpse into other genealogies that have produced what he calls ‘the Data Machine’:

ARKIN UnmannedToday, the Data Machine doesn’t care where it is fighting. It doesn’t matter whether targets are hiding in Hindu Kush caves or in villages of the Fertile Crescent. Nor does Predator care, or Reaper, or Global Hawk, or any other of our other aptly and awkwardly named all-seeing eyes. In fact, they don’t care about anything: they are machines. But the men and women … behind the entire Machine also don’t care, for every place is reduced to geographic coordinates that flash across a screen in seconds. Nations, armies, and even people are reduced to links and networks.

Loitering drones and geolocating weapons just need the data. Everyone needs the global information grid and the Internet—or, more precisely, an internet. Actual battlefield geography and culture have become immaterial. The node and the network sentry become the determinant and the provocateur of action—all the way to the edge of the world, anywhere.

Afterwar(d)s

I’ve been working my way through the proofs of ‘The natures of war’, in which (among other things) I try to show that soldiers are not only vectors of military violence but also victims of it.  My analysis fastens on the Western Front in the First World War, Northern Africa in the Second World War, and Vietnam – the final draft is under the DOWNLOADS tab and the published version should be up on the Antipode website later this month – but I hope it will be clear to readers that the implications of this claim , and the others in the essay, extend into our own present.  They also intersect with my current research on casualty evacuation from war zones, 1914-2014.

So I’ve been interested in three recent contributions that detail the aftermath of war for those who fight them.

First, Veterans for Peace UK have worked with Darren Cullen to produce a short film, Action Man: Battlefield Casualties [see the clip above] in an attempt, as Charlie Gilmour explains over at Vice,

‘to show the shit beneath the shine of polished army propaganda. Featuring PTSD Action Man (“with thousand-yard stare action”), Paralysed Action Man (“legs really don’t work”) and Dead Action Man (“coffin sold separately”)…’ [see also my post on ‘The prosthetics of military violence‘]

Actionman-1024x379

In keeping with the project’s authors, Charlie insists – I think properly – that many of those who were sent to Afghanistan from the UK were child soldiers (and here I also recommend Owen Sheers‘ brilliant Pink Mist for an unforgettable portrayal of what happens when boys who grow up ‘playing war’ end up fighting it: see also here and here).  As the project’s web site notes:

The UK is one of only nineteen countries worldwide, and the only EU member, that still recruits 16 year olds into its armed forces, (other nations include Iran and North Korea). The vast majority of countries only recruit adults aged 18 and above, but British children, with the consent of their parents, can begin the application process to join the army aged just 15…

It is the poorest regions of Britain that supply large numbers of these child recruits. The army has said that it looks to the youngest recruits to make up shortfalls in the infantry, by far the most dangerous part of the military. The infantry’s fatality rate in Afghanistan has been seven times that of the rest of the armed forces.

Forces Watch JPEG

Child Soldiers International JPEG

A study by human rights groups ForcesWatch and Child Soldiers International in 2013 found that soldiers who enlisted at 16 and completed training were twice as likely to die in Afghanistan as those who enlisted aged 18 or above, even though younger recruits are, for the most part, not sent to war until they are 18.

You can find another thoughtful reflection on child soldiers by Malcolm Harris over at the indispensable Aeon here. He doesn’t include the British Army in his discussion, but once you do you can see that the implications of this passage extend beyond its ostensible locus (Nigeria):

But can a child truly volunteer to join an army? Even when they enlist by choice, child soldiers do so under a set of constraining circumstances. UNICEF makes the choices sound easy: war or dancing, war or games, war or be a doctor. No rational child would pick the former for themselves, and that’s posed as evidence that their freedom has been taken from them. But when the choice is ‘soldier or victim’, voluntarism takes on a different meaning.

FINKEL Thank you for your service

Second, moving across the Atlantic and providing an extended riff on the ‘thank you for your service’ gesture, the latest issue of New Left Review includes an essay by Joan Wypijewski, ‘Home Alone‘, that describes the journey home faced by many US veterans.  She begins by putting David Finkel‘s compelling book in context:

The term ‘Thank You for Your Service’ developed early on in the long wars. Like ‘Support the Troops’, it was a way for a sheltered people to perform unity. In towns across America yellow ribbons, yellow lawn signs, balloons and car decals sprouted like team colours on game day. War would be a sport, the people spectators, and ‘Thank you for your service’ the high-five to combatants after quick and decisive victory. When that proved a vain hope, team spirit settled into the rhythms of commerce. ‘Support the Troops’ appeared the way ‘Buy American’ once had—a slogan on shop windows, billboards, bumper stickers. War was an enterprise, security its product, the people consumers, the soldiers trained workers and ‘Thank you for your service’ a kind of tip. As the enterprise (though hardly the business) failed, the signs faded, sometimes replaced by an image of folded hands, ‘Pray for Our Troops’. War had become a problem, the soldiers exhausted, the people clueless and ‘Thank you for your service’ a bit of empty etiquette, or a penance. By the time Finkel was writing [his book was published in October 2013], what remained among civilians was a desire to move on, and among soldiers, bitterness. ‘They wouldn’t be fucking thanking me if they knew what I did’, many would say, in almost exactly the same words.

Joan works her way through Finkel’s account, and then turns to Laurent Bécue-Renard’s Of Men and War, a documentary film – five years in the making, and the second instalment in a trilogy devoted to a ‘genealogy of wrath‘ – of Trauma Group sessions at a treatment centre in the Napa Valley:

‘What we have is embarrassing as shit’, a thick, tight young white man says in the Trauma Group. ‘You feel small—you feel defective.’ And so it goes, and so men trained for toughness talk of being weak and scared and monstrous, or just diligent. Of working in Mortuary Affairs: ‘breaking the rigour down’ to get the corpse of a 19-year-old who killed himself flat enough for a body bag, or untangling the remains of a group of faceless soldiers burned in a truck who are fused ‘like a bunch of rope’. They talk of their dreams, of their frightened wives. Maybe she moved out and got a restraining order before he came home, or maybe she has the divorce papers but is holding back as long as he’s getting help. ‘I have no clue what it’s like to be a woman married to a man twice your size and that’s lethal, in the military, and takes his rage out on you—someone that’s supposed to love you’, a former medic says. He is slim, white, deer-like. You don’t know his war story yet, and you don’t know when you’ll find out, if you’ll find out, but you listen as he and one after another after another deals with a world of pain. And maybe men balk, and maybe they storm out of the room, and maybe Gusman, whom you’ve also never really met but who is always there, has to remind them that ‘being a hostage to the war zone is not a life’. You follow them out of the room, taking smokes, meditating, visiting their wives or parents, calling on locals, trying to be well or pass for well, knowing they’re not. You watch their children doing typical childlike things, running, laughing in a high-pitched scream, and you feel anxious for everyone in the room. You itch to get back to the Trauma Group and, amazingly, don’t feel like a voyeur, because this isn’t war porn; this is the shit, as they say.

It isn’t beautiful or horrible, it just is. And you don’t like all of these people, but that isn’t the point. They are all struggling to be human again, and you have to ask yourself if you know what that means.

Not so much dressing but ‘addressing their wounds is a revolution’, Bécue-Renard insists, and you can see – literally so – what he means.  Joan’s commentary ends with other, perhaps also revolutionary reflections.  In America, she argues,

… there has been no serious debate on, let alone demand for, a universal draft as a democratic check against offensive war. We talk against empire, but are beneficiaries of the imperial state’s professional and technological adjustments to the anti-war movement’s past victories. We talk about the invisible draft but, perhaps encouraged by the bravery of Iraq Veterans Against the War, still hope that soldiers whose food, clothing, shelter, families and identity depend on the job of war-fighting will mutiny en masse. We talk, from time to time, about the culture of abuse in basic training and on military posts, but are silent on the regimens of discipline that are being hyper-enforced in anticipation of downsizing, in other words layoffs. And for the one thing the military, however twistedly, provides—belonging, solidarity, a sense of honour and family-feeling as against loneliness—we have no alternatives at all.

Finally, Duke University Press has announced that Zoe Wool‘s book, After War: the weight of life at Walter Reed, will be out soon:

In After War Zoë H. Wool explores how the American soldiers most severely injured in the Iraq and Afghanistan wars struggle to build some kind of ordinary life while recovering at Walter Reed Army Medical Center from grievous injuries like lost limbs and traumatic brain injury. Between 2007 and 2008, Wool spent time with many of these mostly male soldiers and their families and loved ones in an effort to understand what it’s like to be blown up and then pulled toward an ideal and ordinary civilian life in a place where the possibilities of such a life are called into question. Contextualizing these soldiers within a broader political and moral framework, Wool considers the soldier body as a historically, politically, and morally laden national icon of normative masculinity. She shows how injury, disability, and the reality of soldiers’ experiences and lives unsettle this icon and disrupt the all-too-common narrative of the heroic wounded veteran as the embodiment of patriotic self-sacrifice. For these soldiers, the uncanny ordinariness of seemingly extraordinary everyday circumstances and practices at Walter Reed create a reality that will never be normal.

20080721-D-1852B-014

Here are two of the endorsements:

“Hollywood films and literary memoirs tend to transform wounded veterans into tragic heroes or cybernetic supercrips. Zoë H. Wool knows better. In her beautifully written and deeply empathic study of veterans of Iraq and Afghanistan at Walter Reed, Wool shows us the long slow burn of convalescence and how the ordinary textures of domestic life unfold in real time. An important and timely intervention.” — David Serlin, author of Replaceable You: Engineering the Body in Postwar America.

“This brilliant and absorbing ethnography reveals how the violence of war is rendered simultaneously enduring and ephemeral for wounded American soldiers. Zoë H. Wool accounts for the frankness of embodiment and the unstable yet ceaseless processes through which the ordinary work of living is accomplished in the aftermath of serious injury. After War is a work of tremendous clarity and depth opening new sightlines in disability and the critical politics of the human body.” — Julie Livingston, author of Improvising Medicine: An African Oncology Ward in an Emerging Cancer Epidemic.

Legal battles

DoD Law of War ManualFollowing up my comments on the Pentagon’s new Law of War Manual, issued last month: commentaries are starting to appear (it’s not surprising these are taking so long: the new version runs to 1200 pages).

Just Security is hosting a forum on the Manual, organised by Eric Jensen and Sean Watts.  They are both deeply embedded in the debate: Eric is a Professor at Brigham Young Law School and was formerly Chief of the Army’s International Law Branch and Legal Advisor to US military forces in Iraq and Bosnia, while Sean is a Professor at Creighton University Law School and on the Department of Law faculty at the United States Military Academy at West Point; he is also Senior Fellow at the NATO Cooperative Cyber Defence Centre of Excellence and served in the US Army’s Judge Advocate General’s Corps.

In the opening salvo, Sean focuses on the Manual‘s identification of three core principles:

“Three interdependent principles – military necessity, humanity, and honor – provide the foundation for other law of war principles, such as proportionality and distinction, and most of the treaty and customary rules of the law of war.”

The implications of this formulation are more far reaching than you might think.  Necessity, proportionality and distinction have long been watchwords, but the inclusion – more accurately, Sean suggests, the resurrection – of ‘humanity’ and ‘honor’ is more arresting: in his view, the first extends the protection from ‘unnecessary suffering’ while the second ‘marks an important, if abstract revival of good faith as a legal restraint on military operations’.

Watch that space for more commentaries, inside and outside the armed camp.

Others have already taken a much more critical view of the Manual.

Claire Bernish draws attention to two particularly disturbing elements here.  First, like several other commentators, she notes passages that allow journalists to be construed as legitimate targets.  While the Manual explains that ‘journalists are civilians’ it also insists there are cases in which journalists may be ‘members of the armed forces […] or unprivileged belligerents.’   Apparently, Claire argues,

‘reporters have joined the ranks of al-Qaeda in this new “unprivileged belligerent” designation, which replaces the Bush-era term, “unlawful combatants.” What future repercussions this categorization could bring are left to the imagination, even though the cited reasoning—the possibility terrorists might impersonate journalists—seems legitimate. This confounding label led a civilian lawyer to say it was “an odd and provocative thing for them to write.”‘

Other commentators, mindful of incidents in which the US military has been accused of targeting independent (non-embedded) journalists, have read this as far more than provocation.  Like other claims registered in the Manual, this has implications for other armed forces – and in this particular case, for example, Ken Hanly points out that ‘what is allowed for NATO and the US is surely legitimate for Israel.’

This is not as straightforward as he implies, though.  Eric Jensen agrees that

‘[T]he writers had to be aware this manual would also be looked to far beyond the US military, including by other nations who are formulating their own law of war (LOW) policies, allies who are considering US policy for purposes of interoperability during combined military operations, transnational and international organizations such as the International Committee of the Red Cross (ICRC) who look to such manuals when considering the development of customary practice, and even national and international tribunals who adjudicate LOW questions with respect to the criminality of individual actions.

While Eric acknowledges ‘the inevitable use of [the Manual] in the determination of customary practice.’ however, he also argues that the authors of the Manual go out of their way to preclude this possibility: they ‘wanted to be very clear that they did not anticipate they were writing into law the US position on the law of war.’

Second, Claire draws attention to a list of weapons with specific rules on use’ (Section 6.5.1), which includes cluster munitions, herbicides and explosive ordnance, and a following list of other ‘lawful weapons’ (Section 6.5.2) for which ‘there are no law of war rules specifically prohibiting or restricting the following types of weapons by the U.S. armed forces’; the list includes drones and Depleted Uranium munitions.  These designations are all perfectly accurate, but Claire’s commentary fastens on the fact that at least two of these weapons have been outlawed by many states.  She draws attention to the hideous consequences of DU and cluster bombs, and explains that cluster bombs:

‘are delineated in the manual as having “Specific Rules on Use”— notably, such weapons’ use “may reflect U.S. obligations under international law” [emphasis added]. While this is technically apt, cluster bombs have been banned by the 2008 Convention on Cluster Munitions—which was agreed to by 116 countries around the world. The U.S. stands out in joining infamous human rights violator, Saudi Arabia, in its refusal to sign. These insidious munitions leave unexploded ordnance for months, or even decades, after the originating bomb was dropped. Children are often maimed or killed when they unwittingly mistake them for toys.’

Meanwhile, also at Just Security but seemingly not part of the Forum, Adil Ahmad Haque has attacked the Manual‘s discussion of ‘human shields’:

The Defense Department apparently thinks that it may lawfully kill an unlimited number of civilians forced to serve as involuntary human shields in order to achieve even a trivial military advantage. According to the DOD’s recently released Law of War Manual, harm to human shields, no matter how extensive, cannot render an attack unlawfully disproportionate. The Manual draws no distinction between civilians who voluntarily choose to serve as human shields and civilians who are involuntarily forced to serve as human shields. The Manual draws no distinction between civilians who actively shield combatants carrying out an attack and civilians who passively shield military objectives from attack. Finally, the Manual draws no distinction between civilians whose presence creates potential physical obstacles to military operations and civilians whose presence creates potential legal obstacles to military operations. According to the Manual, all of these count for nothing in determining proportionality under international law.

If true, this would dramatically qualify the discussion of ‘humanity’ and ‘honor’ above; but, not surprisingly, Charles Dunlap will have none of it.  He objects not only to Adil’s reading of the Manual, but also the logic that lies behind his criticism:

Killing those who do the vast majority of the killing of civilians can save lives. It really can be that simple.

Experience shows that well-meaning efforts to curb the use of force can have disastrous effects on civilians. Think about the restrictions on airstrikes imposed by Gen. Stanley McChrystal in Afghanistan in mid-2009. The result? By the time he was fired a year later in June 2010, civilian casualties had jumped a heart-rending 31% entirely because of increased killings by anti-government forces. (In addition, casualties among friendly troops hit an all-time high in 2010.)

McChrystal Tactical Directive 1

[The unclassified section of McChrystal’s Tactical Directive (above) is here]

When Gen. David Petraeus took command in mid-2010, he took a different, more aggressive approach. While still scrupulously adhering to the law of war, he clarified the rules of engagement in a way that produced a tripling of the number of airstrikes. The result? The increase in civilian casualties was cut in half to 15% by the end of 2010. Under Petraeus’ more permissive interpretation of the use of force against the Taliban and other anti-government forces, the increase the following year was cut almost in half again to 8% (and losses of friendly troops fell 20%). To reiterate, although counterintuitive to some critics, restricting force by law or policy can actually jeopardize the lives of the civilians everyone wants to protect.

Michael O’Hanlon at the Brookings Institue makes exactly the same argument about the Manual here (scroll down), but Dunlap’s sense is much sharper: the Manual, he says, ‘is designed to win wars in a lawful way that fully internalizes, as it says itself on several occasions, the “realties of war.”’  This is immensely important because in effect it acknowledges that neither the Manual nor the laws of war are above the fray.  If the Manual ‘is designed to win wars in a lawful way’ that is precisely because law is in the army’s baggage train, fully incorporated into the juridification of later modern war.  Law is at once a powerful weapon and a moving target.

Base lines and military projections

David Vine has updated his map of the global footprint of the US military over at Politico.

VINE US military bases

I used an early version for my ‘War and Peace’ essay (DOWNLOADS tab), and that map – like this one – was drawn primarily from the annual Base Structure Report, a summary of the US military’s ‘real property inventory’ (all sites owned and managed by the Pentagon).  It’s an unwieldy document which uses a high threshold to filter inclusion:

To qualify for individual entry in the BSR, a DoD site located in the United States must be larger than 10 acres AND have a Plant Replacement Value (PRV) greater than $10 million. If the site is located in a foreign country, it must be larger than 10 acres OR have a PRV greater than $10 million to be shown as a separate entry. Sites that do not meet these criteria are aggregated as an “Other” location within each state or country.

Iraq doesn’t appear in these tabulations – though it is shown on the map – yet the continuing US involvement in the conflict there and across the all-but-erased border in Syria has surely extended its footprint.  As David notes,

‘There were 505 bases at the U.S. occupation’s height, but the Iraqi parliament rejected the Pentagon’s wish to keep 58 “enduring” bases after the 2011 withdrawal. U.S. forces have occupied at least five bases since 2014 and are considering more installations.’

Afghanistan is absent too: ‘By the end of 2014 … the U.S. military will have closed, deconstructed, or vacated most of what were once around 800 military installations, ranging from small checkpoints to larger combat outposts to city-sized bases.’  But the US military retains a significant presence there, and its drones are still based there to support continuing military operations and to attack targets across the border in Pakistan.

There are also strategic omissions.  There’s no mention in the Base Structure Report of Al Udeid Air Base in Qatar, for example, which is the location of US Central Command’s Combined Air and Operations Center.

(You can find more from David on the history of America’s ‘infrastructure for war’ in the Middle East here and on its ‘lily-pad’ strategy here).

There are all sorts of issues involved in measuring a ‘military footprint’ – see my post here and Josh Begley here (who works from the previous year’s Base Structure Report for FY 2013 to produce a radically different visualization) – but for all its uncertainties, David’s map is a sobering snapshot, and he relies on supplementary sources to conclude:

Despite recently closing hundreds of bases in Iraq and Afghanistan, the United States still maintains nearly 800 military bases in more than 70 countries and territories abroad—from giant “Little Americas” to small radar facilities. Britain, France and Russia, by contrast, have about 30 foreign bases combined.

By my calculation, maintaining bases and troops overseas cost $85 to $100 billion in fiscal year 2014; the total with bases and troops in warzones is $160 to $200 billion.

VINE Base Nation

When I first contacted David, his original map formed part of his scorching investigation into Diego Garcia: Island of Shame: the secret history of the US military base on the island of Diego Garcia (Princeton, 2009; paperback 2011: all royalties went to the Chagossians); the new version forms part of an even more ambitious project, Base Nation: how US military bases abroad harm America and the world (Metropolitan Books, 2015):

American military bases encircle the globe. More than two decades after the end of the Cold War, the U.S. still stations its troops at nearly a thousand locations in foreign lands. These bases are usually taken for granted or overlooked entirely, a little-noticed part of the Pentagon’s vast operations. But in an eye-opening account, Base Nation shows that the worldwide network of bases brings with it a panoply of ills–and actually makes the nation less safe in the long run.

As David Vine demonstrates, the overseas bases raise geopolitical tensions and provoke widespread antipathy towards the United States. They also undermine American democratic ideals, pushing the U.S. into partnerships with dictators and perpetuating a system of second-class citizenship in territories like Guam. They breed sexual violence, destroy the environment, and damage local economies. And their financial cost is staggering: though the Pentagon underplays the numbers, Vine’s accounting proves that the bill approaches $100 billion per year.

For many decades, the need for overseas bases has been a quasi-religious dictum of U.S. foreign policy. But in recent years, a bipartisan coalition has finally started to question this conventional wisdom. With the U.S. withdrawing from Afghanistan and ending thirteen years of war, there is no better time to re-examine the tenets of our military strategy. Base Nation is an essential contribution to that debate.

There is a long history of struggles against the presence of US military bases overseas – Catherine Lutz‘s edited collection, The bases of empire: the global struggle against US military posts (New York University Press, 2009) remains an indispensable starting-point.

Of course, the US military is also omnipresent in the United States, with installations in all 50 states and seven territories.  The Base Structure Report includes this summary:

DoD sites JPEG

And these bases have brought their own problems and spawned their own protests too.