I’m delighted that Grégoire Chamayou and Chris Woods have both accepted invitations to act as discussants and interlocutors for my Tanner Lectures, “Reach from the Sky: aerial violence and the everywhere war“, in Cambridge in January.
The format for the Lectures is for me to give two presentations on the first day; the next day a panel of four respondents offers reactions and comments, and then we open up into general debate and discussion.
I provided a series of detailed commentaries on Grégoire’s variously titled Drone Theory/A Theory of the Dronewhen it was originally published in French (see here for a full listing: scroll down), and we met last year at a wonderful workshop on Secrecy and Transparency at the Humanities Research Institute at Irvine, so I’m thrilled that the tables will be reversed. Grégoire’s creative imagination seems to know no bounds – see, for example, here and here – and we keep in close touch so I know this will be a rewarding conversation.
I’ve never met Chris, but I’m really looking forward to doing so: he has worked with the Bureau of Investigative Journalism; his Sudden Justice: America’s secret drone wars is the gold standard for books about the conduct of US remote operations; and he is now busy at Airwars monitoring coalition air strikes over Iraq and Syria. I greatly admire Chris’s combination of probing analysis and lucid prose, and his determination to bring the results to the widest possible public audience is an inspiration.
In this jarring look at contemporary warfare and political visuality, renowned anthropologist of violence Allen Feldman provocatively argues that contemporary sovereign power mobilizes asymmetric, clandestine, and ultimately unending war as a will to truth. Whether responding to the fantasy of weapons of mass destruction or an existential threat to civilization, Western political sovereignty seeks to align justice, humanitarian right, and democracy with technocratic violence and visual dominance. Connecting Guantánamo tribunals to the South African Truth and Reconciliation Commission, American counterfeit killings in Afghanistan to the Baader-Meinhof paintings of Gerhard Richter, and the video erasure of Rodney King to lynching photography and political animality, among other scenes of terror, Feldman contests sovereignty’s claims to transcendental right — whether humanitarian, neoliberal, or democratic—by showing how dogmatic truth is crafted and terror indemnified by the prosecutorial media and materiality of war.
Excavating a scenography of trials —formal or covert, orchestrated or improvised, criminalizing or criminal — Feldman shows how the will to truth disappears into the very violence it interrogates. He maps the sensory inscriptions and erasures of war, highlighting war as a media that severs factuality from actuality to render violence just. He proposes that war promotes an anesthesiology that interdicts the witness of a sensory and affective commons that has the capacity to speak truth to war. Feldman uses layered deconstructive description to decelerate the ballistical tempo of war to salvage the embodied actualities and material histories that war reduces to the ashes of collateral damage, the automatism of drones, and the opacities of black sites. The result is a penetrating work that marries critical visual theory, political philosophy, anthropology, and media archeology into a trenchant dissection of emerging forms of sovereignty and state power that war now makes possible.
Here is the wonderful Talal Asadon the book:
Archives of the Insensible is a remarkable diagnosis of our time, tracing with great subtlety the multiple ways in which violence is transformed into justice and justice gives birth to destruction. This is a startling book written with passion and insight, and a valuable contribution to our understanding of the relationship of violence to international law in the contemporary world.
The Intercept has released a new series of documents – not from Edward Snowden – that provide extraordinary details about the Obama administration’s targeted killing operations (especially in Afghanistan, Yemen and Somalia).
I haven’t had a chance to work through them yet – today is taken up with teaching and Eyal Weizman‘s visit for tonight’s Wall Exchange – but I imagine that readers who don’t already have their heads up will welcome a head’s up.
The reports include a considerable number of informative graphics (taken from briefing slides) together with analysis. Here is the full list:
There have been several attempts to reconstruct the geography of the CIA’s program of extraordinary rendition. I’ve long admired the work of my good friend Trevor Paglen, described in his book with A.C. Thompson, Torture Taxi: on the trail of the CIA’s rendition flights, available in interactive map form through Trevor’s collaboration with the Institute for Applied Autonomy as Terminal Air. (I’ve commented on the project before, here and especially here).
And you can only applaud Trevor’s chutzpah is displaying the results of his work on a public billboard:
The project, which involved the painstaking analysis of countless flight records and endless exchanges with the geeks who track aircraft as a hobby, triggered an installation in which the CIA was reconfigured as a ‘travel agency‘:
At the time (2007), Rhizome – which co-sponsored the project – explained:
Terminal Air is an installation that examines the mechanics of extraordinary rendition, a current practice of the United States Central Intelligence Agency (CIA) in which suspected terrorists detained in Western countries are transported to so-called “black sites” for interrogation and torture. Based on extensive research, the installation imagines the CIA office through which the program is administered as a sort of travel agency coordinating complex networks of private contractors, leased equipment, and shell companies. Wall-mounted displays track the movements of aircraft involved in extraordinary rendition, while promotional posters identify the private contractors that supply equipment and personnel. Booking agents’ desks feature computers offering interactive animations that enable visitors to monitor air traffic and airport data from around the world, while office telephones provide real-time updates as new flight plans are registered with international aviation authorities. Seemingly-discarded receipts, notes attached to computer monitors, and other ephemera provide additional detail including names of detainees and suspected CIA agents, dates of known renditions, and images of rendition aircraft. Terminal Air was inspired through conversations with researcher and author Trevor Paglen (Torture Taxi: On the Trail of the CIA’s Rendition Flights – Melville House Publishing). Data on the movements of the planes was compiled by Paglen, author Stephen Grey (Ghost Plane: The True Story of the CIA Torture Program – St. Martin’s Press) and an anonymous army of plane-spotting enthusiasts.
There’s a short video documenting the project on Vimeo here and embedded below (though strangely Trevor isn’t mentioned and doesn’t appear in it):
Although Trevor subsequently explained why he tried to ‘stay away from cartography and “mapping” as much as possible’ in his work, preferring instead the ‘view from the ground’, the cartography of all of this matters in so many ways – from the covert complicity of many governments around the world in a global geopolitics of torture through to the toll exerted on the bodies and minds of prisoners as they were endlessly shuffled in hoods and chains over long distances from one black site to another.
And now, thanks to the equally admirable work of the Bureau of Investigative Journalism, it’s possible to take the analysis even further. Here is Crofton Blackand Sam Raphaelintroducing their project, ‘The boom and bust of the CIA’s secret torture sites‘:
In spring 2003 an unnamed official at CIA headquarters in Langley sat down to compose a memo. It was 18 months after George W Bush had declared war on terror. “We cannot have enough blacksite hosts,” the official wrote. The reference was to one of the most closely guarded secrets of that war – the countries that had agreed to host the CIA’s covert prison sites.
Between 2002 and 2008, at least 119 people disappeared into a worldwide detention network run by the CIA and facilitated by its foreign partners.
Lawyers, journalists and human rights organisations spent the next decade trying to figure out whom the CIA had snatched and where it had put them. A mammoth investigation by the US Senate’s intelligence committee finally named 119 of the prisoners in December 2014. It also offered new insights into how the black site network functioned – and gruesome, graphic accounts of abuses perpetrated within it.
Many of those 119 had never been named before.
The report’s 500-page summary, which contained the CIA official’s 2003 remarks, was only published after months of argument between the Senate committee, the CIA and the White House. It was heavily censored, while the full 6,000-page study it was based on remains secret. All names of countries collaborating with the CIA in its detention and interrogation operations were removed, along with key dates, numbers, names and much other material.
In nine months of research, the Bureau of Investigative Journalism and The Rendition Project have unpicked these redactions to piece together the hidden history of the CIA’s secret sites. This account unveils many of the censored passages in the report summary, drawing on public data sources such as flight records, aviation contracts, court cases, prisoner testimonies, declassified government documents and media and NGO reporting.
Although many published accounts of individual journeys through the black site network exist, this is the first comprehensive portrayal of the system’s inner dynamics from beginning to end.
At present the mapping is rudimentary (see the screenshot above), but the database matching prisoners to black sites means that it ought to be possible to construct a more fine-grained representation of the cascade of individual movements. The Rendition Project has already identified more than 40 rendition circuits involving more than 60 renditions of CIA prisoners: see here and the interactive maps here.
I wrote about medical neutrality earlier this year (see here). As I noted then, Physicians for Human Rightsstipulates that medical neutrality requires:
The protection of medical personnel, patients, facilities, and transport from attack or interference;
Unhindered access to medical care and treatment;
The humane treatment of all civilians; and
Nondiscriminatory treatment of the sick and injured.
In the wake of the US air strike on a hospital operated by Médecins Sans Frontières (MSF) in Kunduz on 3 October, that first requirement assumes even greater significance: the obligation is not merely to exempt medical personnel, patients and infrastructure from military and paramilitary violence but to protect them from attack.
MSF provides details and updates on the strike here. As I write, far and away the most substantial commentary on what happened – given what we know so far – is Kate Clark‘s detailed analysis at the Afghan Analysts Networkhere (though Matt Lee‘s angry comparison with an Israeli military attack on a hospital in Gaza is worth reading too). As Kate notes,
Expressing distrust in the US military, NATO or Afghan government to uncover the truth, [MSF] said it wants an investigation by the International Humanitarian Fact-Finding Commission (IHFFC), a body set up by the Additional Protocols of the Geneva Conventions and, says MSF, is the only permanent body set up specifically to investigate violations of international humanitarian law. It has never been used before and, as neither Afghanistan or the United States have formally recognized the Commission, any investigation would have to be voluntary.
The IHFFC issued this statement today:
The International Humanitarian Fact-Finding Commission (IHFFC) has been contacted by Médecins Sans Frontières (MSF, Doctors Without Borders) in relation to the events in Kunduz, Afghanistan, on 3 October 2015.
The IHFFC stands ready to undertake an investigation but can only do so based on the consent of the concerned State or States. The IHFFC has taken appropriate steps and is in contact with MSF. It cannot give any further information at this stage.
Alex Jeffrey has commented briefly on the geopolitics of any investigation by the IHFFC, but there has been little or no commentary on how the US military investigates civilian casualty incidents – and this merits discussion because the Obama administration has insisted that the inquiry already under way by the Pentagon will be ‘transparent’, ‘thorough’ and ‘objective’. And whatever may or may not transpire with respect to the IHFFC, it’s exceptionally unlikely that the US military investigation will be stopped.
I’ve worked through five investigations of so-called ‘CIVCAS’ in Afghanistan that have been released through Freedom of Information Act requests. Each branch of the US military is required to maintain its own digital FOIA Reading Room, so that any documentation supplied in response to these requests is released into the public domain. I should say that you need to be adept at using the search function, and to have a very good idea of what you are looking for before you start (though the Pentagon has been remarkably helpful in responding to my inquiries and questions).
It’s also fair to say that the release of investigation reports is uneven. In the immediate aftermath of an earlier, devastating air strike on two tankers hijacked by the Taliban near Kunduz, called in by the German Bundeswehr but carried out by two US aircraft (see my extended discussion here), the United States repeatedly promised to release the investigation report: but it never did, even to the German Bundestag’s committee of inquiry, and despite repeated requests it remains classified.
There is also considerable variation in the transparency and quality of the reports that have been released: some are so heavily redacted that it is extremely (and no doubt intentionally) difficult to construct a reasonably comprehensive narrative, while others are the product of inquiries that seem to have been, at best, perfunctory.
The report into the airstrike in Uruzgan that I have been using for my analysis of the US air strike in Uruzgan in February 2010 – see ‘Angry Eyes (1)‘ and ‘Angry Eyes (2)‘: more to come – is neither. It has been redacted, presumably for reasons of national, operational or personal security, but its 2,000 pages provide enough detail to reconstruct most of what happened. And the investigation team was remarkably thorough: by turns forensic, sympathetic, exasperated and eventually blisteringly angry at what they found. Whether this provides an indication of what we can expect from the present inquiry I don’t know, but it does provide a benchmark of sorts for what we (and, crucially, MSF) ought to expect. (There are also ongoing investigations by NATO and by the Afghan authorities, but no details have been released about them either).
The strike took place on 21 February 2010, and the very next day General Stanley McChrystal (Commander US Forces – Afghanistan and ISAF, Afghanistan) appointed Major-General Timothy McHale to conduct what the US Army calls ‘an informal investigation’ into the incident that ‘allegedly resulted in the deaths of 12-15 local Afghan nationals and caused injured to others’; McHale was assisted by a team of senior officers, including subject matter experts and legal advisers:
There are two points to note here.
First, this was an investigation conducted by the US Army because the airstrike had been called in by US Special Forces and had been carried out by two US Army helicopter crews. But the strike was orchestrated in large measure by a US Air Force Predator crew from Creech Air Force Base in Nevada; in addition to questioning the soldiers and helicopter crews involved, McHale’s team also questioned the Predator flight crew together with the screeners and video analysts at Air Force Special Operations Command at Hurlburt Field in Florida. McHale’s report triggered a second ‘Commander-Directed Investigation’ by US Air Force Brigadier-General Robert Otto into the actions and assessments of the Predator crew; that report was submitted on 30 June 2010. As I write, it’s not known who is leading the US investigation into the bombing of the hospital in Kunduz. Since (on the fourth telling) the strike appears to have been called in by US Special Forces (at the request of Afghan forces) and carried out by a US Air Force AC-130 gunship this will presumably be a joint investigation.
Second, the term ‘informal investigation’ is a technical one; certainly, on McHale’s watch the conduct of the inquiry was remarkably rigorous. US Army Regulation 15-6 sets out how the Army is to conduct an investigation:
‘The primary function of any investigation or board of officers is to ascertain facts and to report them to the appointing authority. It is the duty of the investigating officer or board to ascertain and consider the evidence on all sides of each issue, thoroughly and impartially, and to make findings and recommendations that are warranted by the facts and that comply with the instructions of the appointing authority.’
Here is the distinction between informal and formal investigations (I’ve taken this summary from a US Army Legal Guide here; the full version, specifying the conduct of an informal investigation, is here and here):
“Informal investigations may be used to investigate any matter, to include individual conduct. The fact that an individual may have an interest in the matter under investigation or that the information may reflect adversely on that individual does not require that the proceedings constitute a hearing for that individual. Even if the purpose of the investigation is to inquire into the conduct or performance of a particular individual, formal procedures are not mandatory unless required by other regulations or by higher authority. Informal investigations provide great flexibility. Generally, only one investigating officer is appointed (though multiple officers could be appointed); there is no formal hearing that is open to the public; statements are taken at informal sessions; and there is no named respondent with a right to counsel (unless required by Art 31(b), UCMJ); right to cross-examine witnesses; etc….
“Generally, formal boards are used to provide a hearing for a named respondent. The board offers extensive due process rights to respondents (notice and time to prepare, right to be present at all open sessions, representation by counsel, ability to challenge members for cause, to present evidence and object to evidence, to cross examine witnesses, and to make argument). Formal boards include a president, voting members, and a recorder who presents evidence on behalf of the government. A Judge Advocate (JA) is normally appointed as recorder but is not a voting member. If a recorder is not appointed, the junior member of the board acts as recorder and is a voting member. Additionally, a non-voting legal advisor may be appointed to the board. Formal AR 15-6 investigations are not normally used unless required by regulation.’
In setting all this out, I should add two riders. In treating MG McHale’s investigation in such detail, I don’t mean to imply that I fully concur with its analysis. This is a judgement call, of course: the redactions make it difficult to press on several key issues, all of which relate to who knew what when and where (more to come on this). And neither do I mean to suggest that any US military investigation into what happened in Kunduz, however probing, would be adequate. As MSF’s Chris Stokeshas said, ‘relying only on an internal investigation by a party to the conflict would be wholly insufficient.’ But if the report is conducted with the same careful attention to detail – and if it is released with minimal redactions – it would provide a necessary resource for all those involved in and affected by this truly appalling incident.
More to come – I hope.
UPDATE (1): The US investigation is headed by Brigadier-General Richard Kim. Nancy Youssefreports that his arrival in Kunduz was delayed ‘because of instability in the northern Afghan city.’ As with the Uruzgan air strike in 2010, the video recording from the AC-130 gunship that carried out the attack, together with audio recordings of conversations between the air crew and ground troops, will be of great importance. According to Youssef, these show that ‘rules of engagement—the guidelines for the use of force—were misapplied.’ (In the Uruzgan case, the radio conversations between the air crew(s) and the Joint Terminal Attack Controller on the ground were released in redacted form in response to a FOIA request; apart from a single image of the strike, however, the video remains classified.)
I’ve previously noted the debate surrounding the Pentagon’s new Law of War manual which was issued in June 2015; since the US has admitted that the strike on the hospital was carried out within the US chain of command, section 7.17 on ‘Civilian hospitals and their personnel’ is particularly relevant (see also the Guardian report here):
During international armed conflict, civilian hospitals organized to give care to the wounded and sick, the infirm, and maternity cases, may in no circumstances be the object of attack, but shall at all times be respected and protected by the parties to the conflict.
7.17.1 Loss of Protection for Civilian Hospitals Used to Commit Acts Harmful to the Enemy. The protection to which civilian hospitals are entitled shall not cease unless they are used to commit, outside their humanitarian duties, acts harmful to the enemy.
7.17.1.1 Acts Harmful to the Enemy. Civilian hospitals must avoid any interference, direct or indirect, in military operations, such as the use of a hospital as a shelter for able-bodied combatants or fugitives, as an arms or ammunition store, as a military observation post, or as a center for liaison with combat forces. However, the fact that sick or wounded members of the armed forces are nursed in these hospitals, or the presence of small arms and ammunition taken from such combatants and not yet handed to the proper service, shall not be considered acts harmful to the enemy.
7.17.1.2 Due Warning Before Cessation of Protection. In addition, protection for civilian hospitals may cease only after due warning has been given, naming, in all appropriate cases, a reasonable time limit, and after such warning has remained unheeded.
The obligation to refrain from use of force against a civilian medical facility acting in violation of its mission and protected status without due warning does not prohibit the exercise of the right of self-defense. There may be cases in which, in the exercise of the right of self- defense, a warning is not “due” or a reasonable time limit is not appropriate. For example, forces receiving heavy fire from a hospital may exercise their right of self-defense and return fire. Such use of force in self-defense against medical units or facilities must be proportionate. For example, a single enemy rifleman firing from a hospital window would warrant a response against the rifleman only, rather than the destruction of the hospital.
MSF has consistently denied that anyone was firing from the hospital; it has also insisted that it received no advance warning of the attack – on the contrary, MSF ensured that all US and Afghan forces had the co-ordinates of the hospital, and made frantic phone calls to try to stop the bombing once it started.
UPDATE (2): A team from the Washington Post has produced a remarkably detailed report, ‘based on multiple interviews in Afghanistan and the United States with U.S. and Afghan military officials, Doctors Without Borders personnel and local Kunduz residents’; it includes maps and a graphic showing exactly what an AC-130 is capable of.
As you can see, the illustration makes much of the aircraft’s concentrated firepower, unleashed as it circles counter-clockwise around the target in a five-mile orbit, but the AC-130 also has an extensive sensor suite on board (see ‘Angry Eyes (1)‘: an AC-130 was involved in the early stages of the Uruzgan incident). The reporters do note that the aircraft is equipped with ‘low-light and thermal sensors that give it a “God’s eye [view]” of the battlefield in almost all weather conditions’ – but, as I’ve tried to show in my posts on Uruzgan (and as we know from other sources!), there’s no such thing as a God’s eye view. Even so, the aircrew can surely have been in no doubt that they were bombing a hospital.
This is the second installment of my analysis of an air strike orchestrated by a Predator in Uruzgan province, Afghanistan on 21 February 2010; the first installment is here.
(4) Command and control?
What was happening in and around Khod was being followed not only by flight crews and image analysts in the continental United States but also by several Special Forces command posts or Operations Centers in Afghanistan. In ascending order these were:
(1) the base from which ODA 3124 had set out at Firebase Tinsley (formerly known as Cobra);
(2) Special Operations Task Force-12 (SOTF-12), based at Kandahar;
(3) Combined Joint Special Operations Task Force – Afghanistan (CJSOTF-A) based at Bagram.
Once the ODA 3124 left the wire, command and support passed to SOTF-12; the OD-B at Tinsley had limited resources and limited (and as it happens intermittent) communications access and could only monitor what was happening.
That was normal, but in fact both higher commands did more or less the same: and the investigating team was clearly appalled. At SOTF-12 all senior (field grade) officers were asleep during the period of ‘highest density of risk and threatening kinetic activity’ (although they had established ‘wake-up criteria’ for emergency situations). The Night Battle Captain had been in post for just three weeks and had been given little training in his role; he received a stream of SALT reports from the Ground Force Commander of ODA 3124 (which detailed Size of enemy force, Activity of enemy force, Location and Time of observation) but simply monitored the developing situation – what one investigating officer characterised as ‘a pretty passive kind of watching’.
The same was true at CJSOTF-A (the staff there monitored 15-25 missions a day, but this was the only active operation that had declared a potential Troops in Contact).
When the more experienced Day Battle Captain entered the Joint Operations Center at Kandahar and was briefed by the Night Battle Captain he was sufficiently concerned to send a runner to ask the Judge Advocate, a military lawyer, to come to the JOC. He believed the occupants of the vehicles were hostile but was not convinced that they posed an immediate threat to troops on the ground: ‘I wanted to hear someone who was extremely smart with the tactical directive and use of CAS [Close Air Support] in a situation I hadn’t seen before’.
This was a smart call for many reasons; the commander of US Special Forces, Brigadier General Edward Reeder, told the inquiry: ‘Honestly I don’t take a shit without one [a JAG], especially in this business’. Significantly, the Safety Observer at Creech testified that there was no ‘operational law attorney’ available onsite for aircrews conducting remote operations; conversely, JAGs were on the operations floor of CENTCOM’s Combined Air and Space Operations Centre at Ul Udeid Air Base and, as this case shows, they were available at operations centers established by subordinate commands in-theatre.
The JAG at Kandahar was not routinely called in for ‘Troops in Contact’ but on this occasion he was told ‘my Legal Opinion [was] needed at the OPCENT and that it wasn’t imminent but they wanted me to rush over there right away…’
Meanwhile up at Bagram Colonel Gus Benton, the commanding officer of CJSOTF-A, was being briefed by his second-in-command who understood that the Ground Force Commander’s intention was to allow the three vehicles to move closer to his position at Khod. He thought that made sound tactical sense.
‘I said that … is what we did, we let them come to us so we can get eyes on them. During my time I never let my guys engage with CAS if they couldn’t see it. I said that is great and COL [Benton] said “that is not fucking great” and left the room.’
At 0820, ten minutes after the JAG entered the JOC at Kandahar, while he was watching the Predator feed, the phone rang: it was Benton. He demanded Lt Colonel Brian Petit, the SOTF-12 commander, be woken up and brought to the phone:
He spectacularly mis-read the situation (not least because he mis-read the Predator feed). It was true that the vehicles were in open country, and not near any compounds or villages; but Benton consistently claimed that the vehicles were ‘travelling towards our objective’ whereas – as MG McHale’s investigating team pointed out to him – they were in fact moving away from Khod.
There had also been some, inconclusive discussion of a possible ‘High Value Target’ when the vehicles were first tracked, but the presence of a pre-approved target on the Joint Prioritised Effects List (Benton’s ‘JPEL moving along this road’) had never been confirmed and the Ground Force Commander had effectively discarded it (‘above my authority’, he said).
Certainly, the JAG at Kandahar read the situation differently:
When Benton rang off, the JAG went over to the Day Battle Captain and Lt Col Petit and recommended an Aerial Vehicle Interdiction (AVI) team be called in for a show of force to stop the vehicles without engaging the occupants in offensive action.
They agreed; in fact another Task Force also watching the Predator feed called to make the same suggestion, and the Fires Officer set about arranging to use their Apache helicopters to conduct an AVI:
The Fires Officer had been responsible for setting up the Restricted Operating Zone for aircraft supporting the ODA – de-conflicting the airspace and establishing what aircraft would be available – but its management was de-centralised:
‘I establish the ROZ, give the initial layout of what assets are going on, and then I pass that to the JTAC [Joint Terminal Attack Controller with the Ground Force Commander at Khod]. I pass the frequencies to the assets and the JTAC controls them from there.’
At 0630, long before all this frantic activity at Kandahar, the two OH-58s had arrived at a short hold location beyond the ‘range of enemy visual and audio detection’, and at 0730 they had left to refuel at Tarin Kowt. The Day Battle Captain and the Fires Officer both thought they were still off station. In fact, the helicopters had returned to hold at Tinsley/Cobra at 0810 and flat pitched to conserve fuel (which means they landed and left the rotor blades spinning but with no lift); thirty minutes later the JTAC called them forward and the Predator began to talk them on to the target.
The Day Battle Captain had another reason for thinking he and his colleagues in the JOC had more time. He maintained that the helicopters had been brought in not to engage the three vehicles but to provide air support if and when the ‘convoy’ reached Khod and the precautionary ‘AirTic’ turned into a real TIC or Troops in Contact:
‘… the CAS brought on station for his [the Ground Force Commander’s] use was not for the vehicles but for what we thought was going to be a large TIC on the objective. The weapons team that was pushed forward to his location was not for the vehicles, it was for the possibility of a large TIC on the objective based on the ICOM chatter that we had.’
That chimes with Benton’s second-in-command at Bagram, who also thought the Ground Force Commander was waiting for the ‘convoy’ to reach Khod, but neither witness explained the basis for their belief. It was presumably a string of transmissions from the JTAC to the Predator crew: at 0538 he told them the Ground Force Commander wanted to ‘keep tracking them and bring them in as close as we can until we have CCA up’ (referring to the Close Combat Attack helicopters, the OH-58s); shortly before 0630 he confirmed that the Ground Force Commander’s intent was to ‘permit the enemy to close, and we’ll engage them closer when they’re all consolidated’; and at 0818 he was still talking about allowing the vehicles to ‘close distance.’
Yet this does not account for the evident urgency with which the Day Battle Captain and the JAG were concerned to establish ‘hostile intent’ and ‘immediate threat’. When the vehicles were first spotted they were 5 km from Khod, and when they were attacked they were 12 km away across broken and difficult terrain: so what was the rush if the Ground Force Commander was continuing to exercise what the Army calls ‘tactical patience’ and wait for the vehicles to reach him and his force?
In fact, the messages from the Ground Force Commander had been mixed; throughout the night the JTAC had also repeatedly made it clear that the ODA commander’s intent was ‘to destroy the vehicles and the personnel’. The Ground Force Commander insisted that ‘sometime between 0820 and 0830’ he sent a SALT report to SOTF-12 to say that he was going to engage the target. Unfortunately there is no way to confirm this, because SOTF’s text records of the verbal SALT reports stopped at 0630 for reasons that were never disclosed (or perhaps never pursued), but it would explain why the JTAC’s log apparently showed the JAG contacting him at 0829 to confirm there were no women and children on the target. It would also account for testimony by one of the screeners, who realised that the helicopters were cleared to engage at 0835, ten minutes before the strike, when the NCO responsible for monitoring the Predator feed at SOTF-12 ‘dropped’ into the ‘ISR’ (I presume the relevant chat room window), and in response:
‘The MC [Mission Intelligence Co-ordinator at Creech] passed that the OH58 were cleared to engage the vehicles. We were all caught off guard… It seemed strange because we had called out that these vehicles were going west. I don’t know how they determined these vehicles to be hostile… I brought up a whisper [private chat] with the MC, I said are you sure, what are the time frames when they will be coming in, and the MC responded saying we don’t know their ETA and at that moment the first vehicle blew up…’
Should those watching the events unfold have been taken aback when the vehicles were attacked? According to the pilot of the Predator, he and his crew were surprised at the rapid escalation of events:
‘The strike ultimately came a little quicker than we expected…. we believed we were going to continue to follow, continue to pass up feeds… When he decided to engage with the helos when they did, it happened very quickly from our standpoint. I don’t have a lot of info or situational awareness of why the JTAC decided to use them when they did. When they actually came up … the JTAC switched me on frequencies. So we weren’t talking on the frequency I was talking to him on a different frequency to coordinate with the helos.
But their surprise was as nothing compared to the reaction of most observers when the first vehicle exploded. The officer in charge of the screeners and imagery analysts who had been scrutinising the Predator feed at Air Force Special Operations Command at Hurlburt Field in Florida couldn’t believe it:
The Day Battle Captain testified:
‘I did not feel that the ground force commander would use any kind of close air support whatsoever to engage those vehicles… Based on the information that I had and looking at the vehicles move away it did not appear that they were moving towards the ground forces…
… as we were watching the Predator feed the first vehicles exploded. And everyone in the OPSCEN was immediately shocked… The amount of time from when that course of action approved by the SOTF commander to when we actually saw the strike occur there was no time, there was not adequate time to inform the ground commander that that was the course of action decided by the CJSOTF commander… I have phones ringing left and right, talking to people, trying to explain things, you know we look up on the screen and it happened…’
The Fires Officer:
‘I don’t think at any time anyone communicated to the GFC [Ground Force Commander] not to strike these vehicles because it is not something that we normally do. We feel that if he is in contact with the Predator and the OH-58s that we sent out to screen which we were not aware of and he is on the ground he generally has a pretty good picture of what is going on. He might be more privy to some conversation that he had with the OH-58 than what we know about. We normally give the GFC pretty big leeway on how they operate and the same with the JTAC because he has control of the assets and I am not going to try to take his assets away.’
In short, the investigation concluded that the Ground Force Commander never knew that an Aerial Vehicle Interdiction was being arranged, and neither of his higher commands were aware that he had cleared the helicopters to attack the three vehicles.
But, as I will show next, what lay behind these failures of communication was a de-centralised, distributed and dispersed geography of militarised vision whose fields of view expanded, contracted and even closed at different locations engaged in the administration of military violence. Far from being a concerted performance of Donna Haraway‘s ‘God-trick’ – the ability to see everything from nowhere – this version of networked war was one in which nobody had a clear and full view of what was happening.
Part of this can be attributed to technical issues – the different fields of view available on different platforms, the low resolution of infra-red imagery (which Andrew Cockburn claims registers a visual acuity of 20/200, ‘the legal definition of blindness in the United States’), transmission interruptions, and the compression of full-colour imagery to accommodate bandwidth pressure. So for example:
But it is also a matter of different interpretive fields. Peter Asarocautions:
‘The fact that the members of this team all have access to high-resolution imagery of the same situation does not mean that they all ‘‘see’’ the same thing. The visual content and interpretation of the visual scene is the product of analysis and negotiation among the team, as well as the context given by the situational awareness, which is itself constructed.’
The point is a sharp one: different visualities jostle and collide, and in the transactions between the observers the possibility of any synoptic ‘God-trick’ disappears. But it needs to be sharpened, because different people have differential access to the distributed stream of visual feeds, mIRC and radio communications. Here the disposition of bodies combines with the techno-cultural capacity to make sense of what was happening to fracture any ‘common operating picture’. As one officer at Kandahar put it:
‘We didn’t have eyes on, minus ISR platform, that we can all see, who watches what? All the discrepancies between who watches what. What I see may be different from what someone else might interpret on the ISR… ISR is not reliable; it is simply a video platform.’
He was talking specifically about the multiple lines of communication (and hence bases for interpretation) within his Operations Center: now multiply that across sites scattered across Afghanistan and the continental United States and it becomes clear that the contemporary ‘fog of war’ may be as much the result of too much information as too little.
I promised to post the notes for my presentation of ‘Angry Eyes: the God-Trick and the geography of militarised vision‘, and this is the first instalment (illuminated by some of the slides from the presentation). This isn’t the final, long-form version – and I would welcome comments and suggestions on these notes – but I hope it will provide something of a guide to where I’m coming from and where I’m going.
In many ways, this is a companion to ‘Dirty Dancing: drones and death in the borderlands’ (I’ll post the full text version of that shortly; until then see here, here and here), but that essay examines aerial violence in the Federally Administered Tribal Areas of Pakistan, tracing the long history of air strikes in the region, from Britain’s colonial ‘air policing’ of its North West Frontier through the repeated incursions by Afghan and Soviet aircraft during the Soviet occupation of Afghanistan (which are missing from most critical accounts) to today’s drone strikes directed by the CIA and air raids conducted by the Pakistan Air Force. ‘Angry Eyes’ focuses instead on a series of US air strikes inside Afghanistan.
(1) Eyes in the Sky
The history of aerial reconnaissance reveals an enduring intimacy between air operations and ground operations. Balloons and aircraft were essential adjuncts to army (and especially artillery) operations; before the First World War most commentator insisted that the primary use of military aircraft would be to act as spotters for artillery, enabling the guns to range on distant targets, and that bombing would never assume a major offensive role. As I’ve noted elsewhere, Orville Wright was among the sceptics: ‘I have never considered bomb-dropping as the most important function of the airplane,’ he told the New York Times in July 1917, ‘and I have no reason to change this opinion now that we have entered the war.’ For him – though he did not altogether discount the importance of striking particular targets, like the Krupp works at Essen – the key role of the aeroplane was reconnaissance (‘scouting’) for ground forces, including artillery: ‘About all that has been accomplished by either side from bomb dropping has been to kill a few non-combatants, and that will have no bearing on the result of the war.’ That was, of course, a short-sighted view – even in the First World War aircraft carried out strikes against targets on and far beyond the battlefield – but the sharper point is that the importance of aerial reconnaissance depended on a version of what today would be called networked war (albeit a desperately imperfect one) (see my ‘Gabriel’s Map [DOWNLOADS tab]; for the pre-war history of bombing, see here; for the bombing of Paris in the First World War see here).
Over the next 50 years the technologies of vision changed dramatically: from direct to indirect observation, from delayed to real-time reporting, and from still to full motion imagery.
And the ligatures between seeing (or sensing) and shooting steadily contracted until these functions were combined in a single platform – notably (but not exclusively) the Predator and the Reaper. Even then, wiring aerial operations to ground manoeuvres often (even usually) remains central:
Remarks like these speak directly to Donna Haraway’s cautionary critique of the ‘God-Trick’: the claim to see everything from nowhere, or at least from a privileged ‘vanishing point’. This has been made explicit by Lauren Wilcox in Bodies of Violence:
… the satellite systems and the drone’s video cameras mean that the bomber’s eye view is the God’s eye view of objectivity… this myth is put into practice in the apparatus of precision bombing, in which the view from above becomes the absolute truth, the view from nowhere.
And – Haraway’s point, which has been sharpened by Wilcox – is that this view from nowhere is, in some substantial sense, a view from no-body (and even of no-body). Here is Owen Sheers in his novel I saw a man:
“A U.S. drone strike.” That was all the press release said. No mention of Creech, screeners, Intel coordinator, an operator, a pilot. It was as if the Predator had been genuinely unmanned. As if there had been no hand behind its flight, no eye behind its cameras.
The appeal to the divine is thus more than a rhetorical device. One Predator pilot admitted that ‘Sometimes I felt like God hurling thunderbolts from afar.’ As Wilcox notes, then,
‘Precision bombing reproduces the illusion of a disembodied subject with not only a privileged view of the world, but the power to destroy all that it sees…. The posthuman bodies of precision bombers, relying on God’s eye, or panoptical, views are produced as masterful, yet benign, subjects, using superior technology to spare civilians from riskier forms of aerial bombardment.’
And yet there have been seemingly endless civilian casualties…
(2) Killing and casualties in Afghanistan
Throughout the US-led occupation of Afghanistan, air strikes have been the overwhelming cause of civilian deaths caused by coalition forces:
As Jason Lyall‘s marvellous work shows (below), air strikes have been concentrated in the south. I should note that the title of his map refers explicitly to ISAF air operations – I’m not sure if this includes those conducted under the aegis of Operation Enduring Freedom, a separate US-UK-Agfghan operation, although a primary source of his data is USAF Central Command’s Airpower Statistics. It makes a difference, for reasons I’ll explain later; the strike that is my primary focus took place in the south (in Uruzgan) but was in support of a Special Forces operation conducted under OEF.
In any event, most of those strikes have been carried out from conventional platforms – strike aircraft or attack helicopters – not drones (though notice how the data on weapons released from Predators and Reapers was rapidly removed from the regular Airpower Statistics issued by US Central Command):
This relates to a specific period, and one might expect drone strikes to become even more important as the numbers of US ground troops in Afghanistan fall. Even so:
in many, perhaps most of those cases drones have provided vital intelligence, surveillance and reconnaissance (ISR) capabilities: in effect, they may well have orchestrated the attacks even if they did not execute them;
according to the Bureau of Investigative Journalism [‘Tracking drone strikes in Afghanistan‘], ‘Afghanistan is the most drone bombed country in the world… Research by the Bureau… has found more than 1,000 drone attacks hit the country from the start of 2008 to the end of October 2012. In the same period, the Bureau has recorded 482 US drone strikes in Pakistan, Yemen, Somalia and Libya’; and
where drones have also carried out the attacks, Larry Lewis’s analysis of classified SIGACT data shows that ‘unmanned platforms [are] ten times more likely to cause civilian casualties than manned platforms’ (see also here)
There have been two main forms of air strike in Afghanistan. First, the US military carries out so-called ‘targeted killing’ there as well as elsewhere in the world; it has its own Joint Prioritized Effects List of people deemed to be legitimate military targets (see here and here), and the supposed capacity of its drones and their crews to put ‘warheads on foreheads’ means that they are often involved in these remote executions.
Even so, these operations have certainly caused the deaths of innocent civilians (see, notably, Kate Clark‘s forensic report on the Takhar attack in September 2010: more here).
Second, the US Air Force also provides close air support to ground troops – and civilian casualties are even more likely to result from these situations, known as ‘Troops in Contact’.
As Marc Garlasconoted when he was working for Human Rights Watch:
“When they have the time to plan things out and use all the collateral damage mitigation techniques and all the tools in their toolbox, they’ve gotten to the point where it is very rare for civilians to be harmed or killed in these attacks. When they have to do it on the fly and they are not able to use all these techniques, then civilians die.”
That said, it is simply wrong to claim that the US military is indifferent to civilian casualties. There have been several major studies of civilian casualties (see also here and here).
In addition, the juridification of later modern war means that military lawyers (JAGs) are closely involved in operational decisions (though the laws of war provide at best a limited shield for civilians and certainly do not outlaw their deaths); Rules of Engagement and Tactical Directives are issued and modified; and investigations into ‘civilian casualty incidents’ (CIVCAS) are established at the commander’s discretion. Of most relevance to my own argument is General Stanley McChrystal‘s Tactical Directive issued on 6 July 2009.
This was not window-dressing. Here is Michael Hastings in his by now infamous profile of McChrystal in Rolling Stone (8 July 2010):
McChrystal has issued some of the strictest directives to avoid civilian casualties that the U.S. military has ever encountered in a war zone. It’s “insurgent math,” as he calls it – for every innocent person you kill, you create 10 new enemies. He has ordered convoys to curtail their reckless driving, put restrictions on the use of air power and severely limited night raids. He regularly apologizes to Hamid Karzai when civilians are killed, and berates commanders responsible for civilian deaths. “For a while,” says one U.S. official, “the most dangerous place to be in Afghanistan was in front of McChrystal after a ‘civ cas’ incident.” The ISAF command has even discussed ways to make not killing into something you can win an award for: There’s talk of creating a new medal for “courageous restraint,” a buzzword that’s unlikely to gain much traction in the gung-ho culture of the U.S. military.
Indeed, McChrystal’s actions were fiercely criticised: see Charles Dunlap here (more here).
(3) Predator View
And so I turn to one of the most extensively documented CIVCAS incidents in Afghanistan: an attack on three vehicles near the village of Shahidi Hassas in Uruzgan province in February 2010, which killed at least 15-16 civilians and injured another 12. This has become the ‘signature strike’ for most critical commentaries on drone operations:
In the early morning of 21 February 2010 a US Special Forces team of 12 soldiers (these are always described as Operational Detachment Alpha: in this case ODA 3124) supported by 30 Afghan National Police officers and 30 Afghan National Army troops flew in on three Chinook helicopters to two locations near the village of Khod. This is an arid, mountainous region but Khod lies in a river valley where an extensive irrigation system has been constructed to create a ‘green zone’:
On a scale from 0 to 2, this was a ‘level 1 CONOPS’, which means that it was judged to pose a ‘medium risk’ to the troops with ‘some potential for political repercussions’. These are usually daylight cordon and search operations with air support. In this case the mission was to search the compounds in and around the village for a suspected IED factory and to disrupt ‘insurgent infrastructure’.
The Taliban clearly knew they were coming. While the troops waited for dawn the scanners on their MBITR radios picked up chatter urging the mujaheddin to gather for an attack, and they passed the frequency to an AC-130 gunship which was providing air support; through their night vision goggles the troops could see figures ducking into the cover provided by the irrigation ditches; and communications intercepted by other support aircraft, including a manned electronic signals intelligence platform referred to only by its call sign ‘Arrow 30’, confirmed a strong Taliban presence.
There were reports of vehicles moving towards the village from the south, and then headlights were detected five kilometres to the north. The AC-130 moved north to investigate. It had an extensive sensor suite on board but its resolution was insufficient for the crew to detect whether the occupants of the vehicles were armed [PID or ‘positive identification’ of a legitimate military target], and so they co-ordinated their surveillance with a Predator that had taken off from Kandahar Air Field and was controlled by a crew (call-sign KIRK 97) at Creech Air Force Base in Nevada. In addition to its Multi-Spectral Targeting System, the Predator was equipped with an ‘Air Handler’ that intercepted and geo-located wireless communications; this raw signals intelligence was handled by an ‘exploitation cell’ (almost certainly operated by a National Security Agency unit at Kandahar) who entered their findings into one of the chat-rooms monitored by the Predator and other operations centres that were involved in the mission.
When the AC-130 started to run low on fuel, the Predator took over ISR for the duration of the mission. The JTAC could not see the trucks from his position on the ground, and neither did he have access to the full-motion video feed from the Predator – the ODA was not equipped with a ruggedised laptop or ROVER [Remote Operational Video Enhanced Receiver] that should have been standard equipment (‘There’s one per base, and if it goes down you’re out of luck’) – and so he had to rely entirely on radio communications with the flight crew.
Throughout the night and into the morning the crew of the Predator interpreted more or less everything they saw on their screens as indicative of hostile intent: the trucks were a ‘convoy’ (at one stage they were referred to as ‘technical trucks’); the occupants were ‘Military Aged Males’ (’12-13 years old with a weapon is just as dangerous’); when they stopped to pray at dawn this was seen as a Taliban signifier (‘I mean, seriously, that’s what they do’); and when the trucks swung west, away from the direct route to Khod, this was interpreted as ‘tactical manoeuvring’ or ‘flanking’.
Eventually the ground force commander with ODA 3124 became convinced of hostile intent, and anticipated an imminent ‘Troops in Contact’. This in turn prompted the declaration of a precautionary ‘AirTIC’ to bring strike aircraft on station since the Predator only had one Hellfire missile onboard. The ground force commander was annoyed when fighter aircraft arrived (call-sign DUDE 01) – ‘I have fast movers over my station, my desire is to have rotary-wing aircraft’ – because he believed the engine noise would warn the target. In fact, the JTAC who had access to intercepts of Taliban radio communication confirmed that ‘as soon as he showed up everyone started talking about stopping movement’; coincidentally, as it happened, the vehicles immediately swung west, heading away from Khod.
Two US Army Kiowa combat helicopters (OH-58s, call-sign BAM-BAM) were now briefed for the attack.
Their situation map (below) confirmed this as a landscape of ever-present threat, and this imaginative geography was instrumental in the reading of the situation and the activation of the strike:
Meanwhile, the Predator’s sensor operator was juggling the image stream, switching from infrared to ‘Day TV’ and trying to sharpen the focus:
The helicopters had their own sensor system – a Mast Mounted Sight (MMS) – but its resolution was low (see below); they were also reluctant to come in low in case this warned the target:
In any case, there were severe limitations to what the pilots could see:
So, for all these reasons, they were reliant on what the Predator crew was telling them (they too had no access to the FMV feed from the Predator). They lined up for the shot, and the Predator crew keenly anticipated being able to ‘play clean up’. ‘As long as you keep somebody that we can shoot in the field of view,’ the Predator pilot told his Sensor Operator, ‘I’m happy.’
Throughout the mission the Predator crew had been communicating not only by radio but also through mIRC (internet relay chat); multiple windows were open during every mission, but KILLCHAIN was typed into the primary chat room to close down all ‘extraneous’ communications during the final run so that the crew could concentrate on executing the strike.
The ground commander through the JTAC cleared the helicopters to engage: ‘Type Three’ on the slide above refers to a control situation in which the JTAC can see neither the target nor the strike aircraft and wishes to authorise multiple attacks within a single engagement. According to the US Air Force’s protocols for terminal control:
Type 3 control does not require the JTAC to visually acquire the aircraft or the target; however, all targeting data must be coordinated through the supported commander’s battle staff (JP 3-09.3). During Type 3 control, JTACs provide attacking aircraft targeting restrictions (e.g., time, geographic boundaries, final attack heading, specific target set, etc.) and then grant a “blanket” weapons release clearance to meet the prescribed restrictions. The JTAC will monitor radio transmissions and other available digital information to maintain control of the engagement.
Hellfire missiles from the helicopters ripped into the trucks, and when the smoke cleared those watching – from the helicopters and on screens at multiple locations in Afghanistan and the continental United States – began to suspect that women and children were clearly in the field of view. A team from ODA 3124 was helicoptered in to co-ordinate the evacuation of casualties and to conduct a ‘sensitive site exploration’.
It turned out that the occupants of the vehicles were all Hazaras who were vehemently anti-Taliban (4,000 Hazara had been massacred by the Taliban at Mazar-i-Sharif in August 1998); they were going to Kandahar for a variety of reasons – shopkeepers going for supplies, a mechanic going to buy spare parts, students returning to school, patients seeking medical treatment, others simply looking for work – and they were travelling together (‘in convoy’) for safety through what they knew was Taliban territory. When civilian casualties were eventually confirmed – which is a story in itself – General McChrystal set up an Informal Investigation.
Most commentators (including me in “From a view to a kill”: DOWNLOADS tab) have endorsed the central conclusion reached by the Army investigation:
But this was not the conclusion reached by the USAF Commander’s Directed Investigation into the actions of the Predator crew (which McChrystal ordered when he received McHale’s report). Major-General Robert Ottoconceded that ‘the Predator crew’s faulty communications clouded the picture on adolescents and allowed them to be transformed into military-aged males’, but he insisted that their actions were otherwise entirely professional:
‘Upon INFIL and throughout the operation, extensive Intercepted Communications (ICOM) chatter correlated with FMV and observed ground movement appeared to indicate a group of over thirty individuals were an insurgent convoy…. Kirk 97 did not display an inappropriate bias to go kinetic beyond the desire to “support the ground commander”. The crew was alert and ready to execute a kinetic operation but there was no resemblance to a “Top Gun” mentality.’
The reference was to a statement made to McHale’s team by a captain at Creech:
Be that as it may, the last clause– the desire ‘to help out and be part of this’ – is, I think, substantial. As I argued in “From a view to a kill”, most Predator and Reaper crews insist that they are not thousands of miles from the battlefield but just eighteen inches away: the distance from eye to screen. There is something profoundly immersive about the combination of full-motion video and live radio communication; perhaps the crews who operate these remote missions over-compensate for the physical distance to the troops on the ground by immersing themselves in a virtual distance that pre-disposes them to interpret so much that appears on their screens as hostile and threatening.
So far, so familiar. But two qualifications impose themselves.
First, virtually all the published accounts that I have read – and the one that I have published – draw on a detailed report by David S. Cloud, ‘Anatomy of an Afghan war tragedy‘, that appeared in the Los Angeles Times on 10 April 2011, which was based on a transcript of radio communications between the Predator crew, the helicopter pilots and a Joint Terminal Attack Controller (JTAC) who was relaying information to and from the ground force commander. But according to Andrew Cockburn, McHale’s original investigation compiled a hand-drawn timeline of events that ran for 66 feet around the four walls of a hangar he had commandeered for his office; his investigation ran to over 2,000 pages of evidence and transcripts. It’s a complicated, composite document: a record of transactions – of conversations, negotiations and interrogations inflected by the chain of command – made at different times, in different places and under different circumstances. Redactions make inference necessarily incomplete, and there are inevitably inconsistencies in the accounts offered by different witnesses. So I need to be cautious about producing a too coherent narrative – this is not the tightly integrated ‘network warfare’ described by Steve Niva in his excellent account of Joint Special Operations Command (‘Disappearing violence: JSOC and the Pentagon’s new cartography of networked warfare’, Security dialogue 44 (2013) 185-202).
Still, when you work through those materials a radically different picture of the administration of military violence emerge. In his important essay on ‘The necropolitics of drones’ (International Political Sociology 9 [2015] 113-127) Jamie Allinson uses McHale’s executive summary to demarcate the kill-chain involved in the incident:
The US military “kill chain” involved in the Uruzgan incident comprised ground troops, referred to in the text as “Operational Detachment Alpha” (ODA), the Predator Drone operators based at Creech Air Force Base in Nevada, the “screeners” processing information from the Predator video feeds at Hurlburt Field Base in Florida, and helicopter gunships known as ‘OH-58D’ in the text. The helicopters fired the actual missiles: but this was on the basis of decision made by drone operators based on their interpretation of what the screeners said.
But – as I’ll show in the second instalment – the kill-chain was far more extensive and included two Special Forces operations centers at Kandahar and Bagram that were responsible for overseeing and supporting the mission of ODA-3124.
The significance of this becomes clearer – my second qualification – if the air strike in Uruzgan is analysed not in isolation but in relation to other air strikes that also produced unintended casualties. As a matter of fact, official military investigations are required to be independent; they are not allowed to refer to previous incidents and, indeed, JAGs who advise on targeting do not routinely invoke what we might think of as a sort of ‘case law’ either. But if this air strike is read in relation to two others – an attack by two F-15E strike aircraft on a tanker hijacked by the Taliban near Kunduz on 4 September 2009, and an attack carried out by a Predator in the Sangin Valley on 6 April 2011 – then revealing parallels come into view. All three were supposed to involve ‘Troops in Contact’; the visual feeds that framed each incident – and through which the targets were constituted as targets – were highly ambiguous and even misleading; and the role of the ground force commander and the operations centers that were supposed to provide support turns out to have been critical in all three cases.
The latest issue of Wired has a simply schematic map of ‘an invisible but vast war zone’ created by cyberattacks:
Every month, it seems, a mammoth cyberattack sponsored by a nation state comes to light. In recent years, more than 20 countries have announced their intent to launch or beef up their offensive cyber capabilities. The result is a burgeoning digital arms race that presents a major threat to the security of our data.
But they are very late to the game (and there are also many internal threats to ‘the security of our data’: think NSA or GCHQ). In October 2013 Google Ideas in collaboration with Arbor Networks launched an interactive map of daily Distributed Denial of Service (DDoS) attacks that attempt to make an online service unavailable by overwhelming it with traffic from multiple sources :
According to Arbor Networks,
Attackers build networks of infected computers, known as ‘botnets’, by spreading malicious software through emails, websites and social media. Once infected, these machines can be controlled remotely, without their owners’ knowledge, and used like an army to launch an attack against any target. Some botnets are millions of machines strong. Botnets can generate huge floods of traffic to overwhelm a target. These floods can be generated in multiple ways, such as sending more connection requests than a server can handle, or having computers send the victim huge amounts of random data to use up the target’s bandwidth. Some attacks are so big they can max out a country’s international cable capacity. Specialized online marketplaces exist to buy and sell botnets or individual DDoS attacks. Using these underground markets, anyone can pay a nominal fee to silence websites they disagree with or disrupt an organization’s online operations. A week-long DDoS attack, capable of taking a small organization offline can cost as little as $150.
I discussed these, and connected them to militarised cyberattacks in ‘The everywhere war’ [DOWNLOADS tab].
The site provides an illuminating typology of attacks – TCP connection attacks that attempt to use up all available connections; Volumetric attacks that use up bandwidth; Fragmentation attacks that send a flood of TCP or UDP fragments to a victim, overwhelming their ability to re-assemble the streams and severely reducing performance; and Application attacks that target applications.
There is also an instructive gallery of major attacks:
And in 2014 another internet security company, Norse, released a live stream of origins and targets of attack; I’ve pasted a screenshot below but there is also a YouTube video here.
The image above — which looks like Missile Command on steroids — shows just a snippet of hacking attempts around the world, the countries from which they originate, and the countries that they are attacking.
In reality, the attackers are hitting what Norse calls honey pots — special traps designed to detect unwanted network intrusions by hackers. It’s important to note that the location an attack comes from isn’t necessarily its true origin, as hackers can make an attack look like it’s coming from one place when it’s really coming from another.
You can find a list of other cyber attack maps at CTF365here.
A special issue of Culture Machine on Drone Culture edited by Rob Foleyand Dean Lockwood – culling papers from the excellent As above, so below conference at Lincoln last summer – is out now and available on open access here.
As Above, So Below: Triangulating Drone Culture Rob Coley and Dean Lockwood
Drone Metaphysics Benjamin Noys
Provocation: Unmanned Aerial Realtors Alexander Baker
Perspective: The Drone: God’s Eye, Death Machine, Cultural Puzzle Naief Yehya
Dancing to a Tune: The Drone as Political and Historical Assemblage Ramon Bloomberg
Drone Media: Unruly Systems, Radical Empiricism and Camera Consciousness Anthony McCosker
The Control Room: A Media Archaeology Cormac Deane
Drone It Yourself! On the Decentring of ‘Drone Stories’ Maximilian Jablonowski
Provocation: A Prairie Drone Companion Brad Bolman
Perspective: Vague Ideas, Clear Images Eva Parra Iñesta
Educative Power: The Myth of Dronic Violence in a Period of Civil War Mike Neary
Vaporents: Inhuman Orientations Dane Sutherland
Welcome to the Electrocene, an Algorithmic Agarta Dan Mellamphy, Nandita Biswas Mellamphy
Monarch Drone Communiqué Plastique Fantastique
I’ve previously documented Josh Begley‘s trials with Apple over his Metadata+ app that tracks each new US drone strike. Metadata+ was removed from the app store on Sunday for its ‘exceptionally crude or objectionable content.’ Really.
Begley compiled his information on drone strikes from news reports, so it’s strange to see his app banned while the news apps that report on drone strikes remain. Metadata+ is, at heart, a journalism project and the decision to remove it is a decision about what kinds of journalism Apple deems unacceptable.
Even more revealing is Apple’s determination to shoot the messenger: it’s not the drone strikes that provoke their ire – hardly surprising, since they rely on technologies that are intimately entangled with digital platforms like the iPhone – but information about them.