Theory of the drone 7: Historical precedent and postcolonial amnesia

This is the seventh in a series of posts on Grégoire Chamayou‘s Théorie du drone; this one covers the second chapter of Part II, Ethos and psyche.

2. ‘That others may die’

Raoul CASTEXChamayou opens with a quotation from a French naval officer, Raoul Castex, on early submarine warfare.  Castex was a naval strategist of the first water (he rose to the rank of Admiral, though he was a captain when he wrote the essay Chamayou cites).  His views were canvassed as widely as those of Alfred Thayer Mahan, and they were set out in detail in his five-volume Théories strategiques published by the Société d’Editions Géographiques, Maritimes et Coloniales between 1929 and 1935.  This was hailed as recently as 1995 in a report prepared for US Navy Doctrine Command by James Tritten as ‘perhaps the most complete theoretical survey of maritime strategy to ever appear.’

Castex was not fêted so enthusiastically in the 1920s, however, when his ‘synthesis on submarine warfare’ was seen as a defence of unrestricted German submarine attacks during the First World War.  The first attacks had been against warships, but by early 1915 – and in large measure as a response to Britain’s naval blockade – the focus switched to merchant shipping.  In the course of the war Britain lost over 12 million tons of merchant shipping to U-boats.  In Castex’s view, the success of these attacks showed that the submarine was the instrument that would overturn Britain’s naval supremacy.

Tramp steamer sinking after U-boat attack

Britain bridled at the suggestion, and Castex’s supposedly exculpatory views were quoted in (mis)translation by Britain’s First Lord of the Admiralty at the Committee on Limitation of Armaments in Washington in December 1921; they were repudiated by the senior French naval delegate and provoked a fierce political and public controversy in Britain.  The British delegation had gone to the Washington conference to demand the total abolition of submarine warfare: submarines were virtually impossible to detect, and there was little defence against them (depth charges became available in early 1916, but these had minimal effect).  Before the War, Admiral Sir Arthur Wilson had denounced submarines as “unfair, underhand, and damned un-British”, and during the war there were repeated condemnations of the sinking of merchantmen (and arguments over their ‘noncombatant’ status).   By 1921 the focus of debate had switched back to military targets, and the Admiralty was gravely concerned that the ‘battlefleets of the world” – crucially, of course, those of the Royal Navy – “would be at the mercy of  flotillas of submarines of improved design.”  Britain’s position was opposed by France, Italy and Japan, and the attempt at abolition failed.  Chamayou doesn’t bother with any of this detail – it’s all back-story and you can find much more here – but its relevance for drone warfare and campaigns against it should be obvious.

In his synthesis Castex noted that the practitioners of submarine warfare believed that it had finally realised the dream of risk-less warfare. Here is the passage that Chamayou cites (and its prefiguration of Chamayou’s hunting thematic could not be plainer):

‘They were invulnerable.  War should be a game for them, a sport, a kind of hunting, where, having delivered and spread murder, all that would be left for them to do would be to revel in the sight of their victims’ agony.  Meanwhile they would be safe from retaliation and, once back in port, they would busy themselves with stories of their hunting prowess.’

In Chamayou’s view, drones have reincarnated this myth – and these sentiments – in even stronger terms.  They have transformed the meaning of ‘going to war’; the traditional model of combat is now being displaced by an altogether different ‘state of violence’ that degenerates into slaughter or hunting.  One no longer fights the enemy, Chamayou contends, the enemy is simply eliminated as though one were shooting rabbits.

In the sixteenth century Chamayou says that the iconography of Death often portrayed a soldier fighting a skeleton – most famously in Holbein’s Dance of Death – in a struggle that was always pointless because Death mocked his adversary and always triumphed in the end.   The imagery has now been appropriated in this unofficial patch produced for Reaper crews, where the soldier now assumes the position of Death itself (and becomes synonymous with the MQ-9 Reaper); the slogan – which is in fact a parody of “That others may live”, used as a patch by the USAF’s Pararescue teams  – gives Chamayou the title for his chapter.

That others might die

In a sense, then, both the submarine and the drone trumpet asymmetry as virtue.  And as that parallel implies, the pursuit of asymmetry is by no means novel.  Here is Sebastian Junger:

JUNGER WarA man with a machine gun can conceivably hold off a whole battalion, at least for a while, which changes the whole equation of what it means to be brave in battle…. Machine guns forced infantry to disperse, to camouflage themselves, and to fight in small and independent units. All that promoted stealth over honor and squad loyalty over blind obedience….

As a result much of modern military tactics is geared toward maneuvering the enemy into a position where they can essentially be massacred from safety. It sounds dishonorable only if you imagine that modern war is about honor: it’s not. It’s about winning, which means killing the enemy on the most unequal terms possible. Anything less simply results in the loss of more of your own men.

Historical precedent cannot issue an ethical warrant, however, and Junger admits as much.  Yet Chamayou notes that this is exactly the strategy used time and time again to justify drone warfare and to silence its critics.  His example is an essay by David Bell directed at what he called ‘the increasingly vocal critics who doubt the morality, effectiveness, and political implications of “remote control warfare.”‘

‘[C]ritics tend to present this new frontier of warfare as something largely novel — a sinister science fiction fantasy come to life, and one that has the power to radically change the political dynamics of warfare. But if our current technology is new, the desire to take out one’s enemies from a safe distance is anything but. There is nothing new about military leaders exploiting technology for this purpose. And, for that matter, there is nothing new about criticizing such technology as potentially immoral or dishonorable.  In fact, both remote control warfare, and the queasy feelings it arouses in many observers, are best seen as parts of a classic, and very old history.’

This is perfectly true, as far as it goes, and in my own work I have traced the historical curve of ‘killing at a distance’.  I accept, too, that it is reasonable to ask those who object to killing from (say) 7,500 miles away to stipulate the distance from which they do consider it acceptable to kill (though I’m not sure how Chamayou would respond to such a question).  As Bell wryly remarks, ‘None of today’s critics, as far as I know, have expressed any nostalgia for the pike, or other hand-to-hand weapons.’

BELL First Total WarBell is a professor of history at Princeton, and I greatly admire his revisionist account of The first total war which troubles the usual identification of ‘total war’ with the bloody twentieth century and insists, instead, on Napoleon as the midwife of ‘warfare as we know it’.  In fact, I’ve drawn on Bell’s work for my exploration of the French occupation of Egypt at the end of the eighteenth century.

But that’s the irony: Chamayou argues that it was precisely Europe’s colonial wars that epitomised the desire to kill others from a safe distance, whereas these are conspicuously absent from Bell’s defence of drone warfare.  They don’t loom large in The first total war either, where Bell anticipates Chamayou’s challenge.  He accepts that The first total war deals ‘only rarely with the world beyond Europe’ – the principal exception is indeed Egypt – and he acknowledges that ‘colleagues often suggested to me that the origins of modern total war are surely to be found on the early modern impperial frontier’:

‘Surely it was here, long before the French Revolution, that Europeans first dispensed with notions of chivalric restraint and waged brutal wars of extermination against supposed “savages”.  Did not Europeans learn their worst behavior from imperial encounters in Asia, Africa, and the Americas?’

His answer, in fact, is no:

‘The horrendous slaughters of the Reformation-era wars of religion began well before most European empires had developed much beyond trading posts, and the worst examples occurred in the German states, which had no colonies.  The development of the French and British overseas empires coincided with the introduction of relative moderation and restraint into European warfare, not with their disappearance.’

Bell attributes this state of affairs to the ‘dependence’ of Europeans on indigenous populations. When later imperial armies embarked on Kipling’s ‘savage wars of peace’ in the nineteenth and early twentieth centuries, he argues, ‘the colonial setting mostly offered Europeans a laboratory for testing their own preexisting ideas about war’:  ideas that had been honed, so he insists, by the Napoleonic wars that are the focus of his book.

These are convenient and far from uncontroversial claims, but three riders are necessary that, taken together, reinstate the importance of colonial and imperial modalities of power.

First, Bell’s book glosses over the extraordinary violence of the French occupation of Egypt between 1798 and 1801, including the terrible victory at the Battle of the Pyramids and the French army’s savage and exemplary response to two insurrections in Cairo (he’s not alone: remarkably, Edward Said does much the same in Orientalism).  The violence included close-quarter butchery but also stand-off artillery bombardments that rained shells down onto the city from the Citadel above.  Here is an eye-witness account of the first insurrection:

‘The situation worsened by the time of the afternoon prayer.  Violence and the atmosphere of siege increased.  At that point (the French) fired their guns and bombarded the houses and the quarters, aiming especially at al-Azhar.  They trained cannons and mortars on it, as well as on the positions of the fighters close to it, such as Ghawriya Market and al-Fahhamin.  When this bombardment fell on the people, it was something which they had never witnessed in their whole life… ’ 

Second, whatever the origins of those ‘ideas about war’ – and they were, I think, clearly multiple – they were put into often spectacular effect during the colonial wars of the nineteenth and early twentieth centuries.  And it is those wars that show the most direct continuity with the places and the peoples who are now condemned to live and die under the shadow of the drone.

Third, as Chamayou shows in his discussion of ‘Counterinsurgency from the Air’, so-called ‘air control’ in the early twentieth century was an intrinsically colonial doctrine.  The first experiments in bombing from aircraft took place over Libya before the First World War, and while bombing of civilian targets in Britain, France and Germany took place in the last years of the war, the use of airpower against peoples who had no capacity to strike back was a cornerstone of British policy in Iraq, Afghanistan and on the North-West Frontier of British India.

Chamayou argues that defenders of drone warfare who invoke the ‘nothing new under the sun’ argument do so in an attempt to relativise, even sedate contemporary violence.  They invoke historical precedent – in effect: ‘This has happened time and time again before, so why all the fuss now?’ – but then fail to describe the bloody continuity that yokes past to present.  Hence, as Chamayou concludes: ‘The drone is the weapon of an amnesiac post-colonial violence.’

My own inclination is to press this further.  In The Colonial Present I suggested that what Chamayou describes here as a version of postcoloniality – I still think that term sadly premature – is haunted by Terry Eagleton‘s  ‘terrible twins’: amnesia and nostalgia.  Or, as Eagleton put it, ‘the inability to remember and the incapacity to do anything else.’   Drone strikes in Pakistan, Yemen, Somalia and elsewhere not only suppress the wretched consequences of previous ‘air control’ regimes but also yearn for the swagger and seemingly effortless domination that they imposed.

Theory of the drone 6: Sacrifice, suicide and drones

This is the sixth in a series of posts on Grégoire Chamayou‘s Théorie du drone.  I had planned to cover Part II, Ethos and psyche, in a single post, but I’ve received several requests not to speed up, so I’m continuing chapter by chapter, with supplementary readings and comments as I go.

1.  Drones and kamikazes

Soon after Oliver Belcher started his research programme with me – and I’m delighted to say his thesis on ‘The afterlives of counterinsurgency’ has now been submitted – we had one of many rich conversations about what he called ‘the art of war in an age of digital reproduction’.  The reference, of course, was to Walter Benjamin‘s famous essay, usually translated as ‘The work of art in an age of mechanical reproduction.’  This seems to be widely regarded as the standard, even canonical version since its inclusion in the volume of Benjamin’s essays edited by Hannah Arendt and published as Illuminations.

But it has a more complicated history.  Here is Eric Larsen:

‘After fleeing the Nazi government in 1933, Benjamin moved to Paris, from where he published the first edition of “Work of Art” in 1936. This publication appeared in French translation under the direction of Raymond Aron in volume 5, no. 1 of the Zeitschrift für Sozialforschung. Benjamin subsequently rewrote the essay and after editorial work by Theodore and Margarethe Adorno it was posthumously published in its commonly recognized form in his Schriften of 1955.’

Benjamin Work of ArtIn fact there were four versions of the essay, and several critics regard the second version as the most daring of all (you can find the third version here).  In the third volume of Harvard’s Selected Writings this is translated as ‘The work of art in the age of its technological reproducibility’ (1936) – it’s also available separately in the little book shown on the left – and includes this remarkable passage in an expanded Section VI:

Compared to that of the machine age, of course, this [pre-historic] technology was undeveloped. But from a dialectical stand-point, the disparity is unimportant. What matters is the way the orientation and aims of that technology differ from those of ours. Whereas the former made the maximum possible use of human beings, the latter reduces their use to the minimum. The achievements of the first technology might be said to culminate in human sacrifice; those of the second, in the remote-controlled aircraft which needs no human crew. The results of the first technology are valid once and for all (it deals with irreparable lapse or sacrificial death, which holds good for eternity). The results of the second are wholly provisional (it operates by means of experiments and endlessly varied test procedures). The origin of the second technology lies at the point where, by an unconscious ruse, human beings first began to distance themselves from nature.  It lies, in other words, in play.

It’s extraordinary to read these words 75 or so years after Benjamin wrote them, and their intimations of armed drones and even the supposed ‘Playstation mentality’ that misguides those who operate them (though I think that argument misunderstands the extraordinary immersive capacity of videogames, but that’s another story that I’ve told elsewhere).

Chamayou starts his exploration of ‘Ethos and psyche’ by invoking yet another version of Benjamin’s iconic essay, but his basic point shines through the version I’ve quoted above.  His purpose is to juxtapose one technology or at least its limit-case, sacrifice, which engages the human in the most direct and intimate way possible, once and for all, to another, from which (so he says) the human is disengaged in a mechanical act that is, in principle, endlessly repeatable.

Yet it turns out that this isn’t an historical succession in any simple sense at all: what Chamayou sees instead are two different genealogies – the kamikaze pilot and suicide-bomber on one side and the drone on the other – entwined in a truly deadly embrace.

The linchpin of his argument is provided by a Russian emigré engineer working for RAC, Vladimir Zworykin. Apparently alarmed by press reports in 1934 that the Japanese were considering the formation of a ‘Suicide Corps to control surface and aerial torpedoes’, Zworkyin proposed to use technology to counter the threat.  Previous experiments with radio-controlled aerial torpedoes were all very well, but these were ‘blind weapons’ that inevitably lacked precision.  The Japanese proposed to solve the  problem by using human pilots to guide the explosive platform on to its target – Zworykin’s contrary solution was to guide the aerial torpedo through an ‘electric eye’ (a sort of proto-television).

Zworykin aerial torpedo

The torpedo would be a glider,

‘carried on an airplane to the proximity of where it is to be used, and released.  After it has been released the torpedo can be guided to its target with shortwave radio control, the operator being able to see the target through the “eye” [or Iconoscope] of the torpedo as it approaches.’

In 1935 Zworykin submitted a memorandum to the War and Navy Departments describing a television-controlled missile that could be guided beyond the line of sight, and five years later the US approved ‘Project Block‘ for RCA to develop TV-guided ‘assault drones’ in concert with the US Navy.  When the first Japanese kamikaze units were formed they were indeed deployed against naval targets – but this wasn’t until 1944, so I’m not sure about the source of those much earlier reports that fired Zworykin’s imagination.

I described some earlier experiments with aerial torpedoes here, and you can find much more about Zworykin here and in Alexander Magoun‘s Television: the life story of a technology, pp. 78-84.  He notes that the US Army Air Force was a latecomer to these experiments, and didn’t demonstrate a TV-controlled drone until October 1943, largely because its major investment was in heavy bombers capable of inflicting major destruction on cities and military-industrial targets.  Project Aphrodite did experiment with the use of television to guide war-weary Flying Fortresses filled with explosives and napalm on to targets in Germany, but the attempts were largely unsuccessful and singularly irrelevant to the strategic bombing campaigns of World War II.

Nevertheless, Chamayou argues that to some degree Zworykin had identified the core principle that would later be used to develop the smart bomb and the drone.  His sharper point is that the forerunner of the drone was an anti-kamikaze; sharper because this conceptual origin places the drone within a distinctive ethico-technical economy of life and death.

This ethico-technical economy can be read as an ethic of heroic sacrifice on one side and an ethic of auto-preservation on the other, each a mirror image of its other, ‘two visions of horror’.    Chamayou joins several other commentators to connect the kamikaze attacks of the Second World war to suicide-bombers today, and so argues that in the global North today the cardinal opposition is usually expressed as ‘defiance of death’ versus ‘love of life’: the frequently repeated claim, as at once an explanation and a condemnation of suicide-bombing, that ‘they’ don’t value life as much as ‘we’ do.  Yet, as Chamayou insists, it’s not ‘life in general’ that we value at all: it’s our lives that we cherish.

To develop this argument (which he will later elaborate in other dimensions), Chamayou cites Richard Cohen‘s editorial in the Washington Post on 6 October 2009:

As for the Taliban fighters, they not only don’t cherish life, they expend it freely in suicide bombings. It’s difficult to imagine an American suicide bomber.

He then uses anthropologist Hugh Gusterson‘s response to sharpen his point still further.  Gusterson wonders, with Jacqueline Rose,  why ‘dropping cluster bombs from the air is not only less repugnant [than suicide bombing]: it is somehow deemed, by Western leaders at least, to be morally superior.’  He then reverses the terms of the argument (and in going so prefigures Chamayou’s own argument about the substitution of hunting for combat in many areas of later modern warfare and about the colonial antecedents of drone strikes):

ASAD On suicide bombing[M]any people in the Middle East feel about U.S. drone attacks the way Richard Cohen feels toward suicide bombers. The drone attacks are widely perceived in the Middle East as cowardly, because the drone pilot is killing people on the ground from the safety of an air-conditioned pod in Nevada, where there is no chance that he can be killed by those he is attacking. He has turned combat into hunting. In this regard, the drone is the culmination of a long tradition of colonial war-fighting technologies — going back at least to the machine guns with which British and French colonial soldiers mowed down spear-carrying Africans –that ensure that the “natives” die, in an unfair fight, in considerably larger numbers than the colonial soldiers.

The drone operator is also a mirror image of the suicide bomber in that he too deviates, albeit in the opposite direction, from our paradigmatic image of combat as an encounter between warriors who meet as equals risking the wounding or killing of their own bodies while trying to wound or kill the others’ bodies. The honorable drama of combat lies in the symmetrical willingness of warriors to wager their bodies against each other for a cause. But now, in the words of the anthropologist Talal Asad, in his book On Suicide Bombing, U.S. “soldiers need no longer go to war expecting to die, but only to kill. In itself, this destabilizes the conventional understanding of war as an activity in which human dying and killing are exchanged.”

But there are two other twists to this story that Chamayou doesn’t pursue.

First, in his essay for the Bulletin of the Atomic Scientists Gusterson confounds Cohen’s difficulty in imagining ‘an American suicide bomber’ like this:

‘For decades loyal U.S. soldiers in nuclear missile silos have trained to launch their weapons in the expectation that they would be killed almost immediately afterwards in the ensuing nuclear war. I once interviewed a former special-forces officer who was trained to hike behind enemy lines with a tactical nuclear weapon on his back and place it near an important target. Although the weapon had a timer, he expected to die at ground zero.

If such men were the elite nuclear suicide bombers whose mission was prepared but never carried out, the Cold War turned the whole country into a suicide bomber rehearsing obsessively for the moment when we would “push the button” and take down millions of our enemies with us. Seen in this light, Americans trained for the biggest suicide bombing mission of all.’

Second, there have been ‘successful’ American suicide bombers.  To some historians the first candidate is Andrew Kehoe, who set off an explosion at a schoolhouse in Bath, Michigan in May 1927, killing 44 people, before setting off dynamite in his truck and killing himself and several other people.  Whether you count this as a suicide bombing in the modern sense of the term depends on the criteria you think appropriate.  Many commentators exclude Kehoe and identify three other, more recent American suicide bombers: Shirwa Ahmed, who drove a car bomb into a government compound in Puntland in October 2008, killing as many as 30 people; Farah Mohamed Beledi, who killed himself and three soldiers at a military checkpoint in Mogadishu in June 2011; and Abdisalan Hussein Ali, who attacked African Union troops in Mogadishu six months later.  All three were Somali-Americans who had lived in Minnesota and were recruited by al-Shabaab.

But to exclude Kehoe and claim that these three were not ‘really American’ is to immediately trigger one of Chamayou’s key arguments about the ways in which killing and dying in the age of the drone are racialized.  More soon.

ASBACoda:

As I finished up this post,  I discovered a young American performance artist, Ethan Fishbane, whose show American Suicide Bomber Association has been staged in New York and previously in Indonesia and South Africa.

Apparently he threw one of his stage ‘bombs’ into the garbage last week and unwittingly set off a bomb scare in Manhattan.

“I felt the response [by the police] was wholly appropriate,” he said. “Even if it’s just a prop for a theater piece, they were on top of it.”

Militarized vision

Before I started my odyssey through Grégoire Chamayou‘s Théorie du drone (which will continue next week), I had discussed multiple ways of thinking about the relations between visualities, political technologies of vision and drones.  Much of the work that I pointed to takes place in the borderlands between investigative journalism and visual art: hence my interest in (for example) James Bridle, Omer Fast, and Trevor Paglen (for a quick review and further links, see here).

Two additional essays have crossed my screen, appropriately enough, which contribute to these discussions.

The first is Matt Delmont‘s ‘Drone encounters: Noor Behram, Omer Fast and visual critiques of drone warfare’ [American Quarterly 65 (1) (2013) 193-202]:

‘Drones draw their deadly power from …  twin claims to visual superiority: the ability to see and to resist being seen.  At the same time, however, artists, scholars, and human rights activists have used the visual to contest the expansion of the drone program.’

The first of these, as Tim Mitchell showed in his classical expositions of what, following Heidegger, he called ‘the-world-as-exhibition’ (which has continued to haunt much of my work since Geographical Imaginations), is a profoundly – and appropriately – colonial/imperial impulse.  You can find a suggestive discussion of Heidegger’s original exposition of ‘the conquest of the world as picture’ directed specifically at today’s drone wars in Joseph Pugliese‘s ‘Prosthetics of law and the anomic violence of drones’ [Griffith Law Review 20 (2011) 931-61] and, eventually (!), an extended account in The everywhere war.

What interests Matt is the critical ability to reverse the impulse – to make the unseen seen/scene – and turn the visual back on itself, and that’s exactly the point sharpened in exquisite detail in Henrik Gustafsson‘s ‘Foresight, hindsight and state secrecy in the American West: the geopolitical aesthetics of Trevor Paglen’ [Journal of visual culture 12 (2013) 148-164]:

‘Combining geographic research and artistic practice, self-professed ‘experimental photographer’ Trevor Paglen implements such a dialectical method in his ongoing project to map and photograph the sprawling black sites of the US military and intelligence community. Paglen’s images rarely show human agents, other than the blurry figures boarding an unmarked aircraft, or the blackened-out faces on fake passports. It is concerned, instead, with the agency of space. Moving between imaginative geographies and what Paglen refers to as ‘facts on the ground’, it investigates how the former produces the latter, how imaginative geographies materialize.’

It’s a beautifully realised reading that pays particular attention to what geographer Don Mitchell famously called ‘the lie of the land‘.  In Don’s terms, this was the extraordinary capacity of the landscape – as at once material fabrication and enframed visuality – to conceal through its very physicality the work involved and embodied in its production.  In much the same way, Henrik suggests, Trevor’s work offers a series of strategic reversals, détournements, of the ‘dark geography’ of the national security state inscribed in and on the landscape (and the skyscape).

Paglen Untitled (Reaper Drone)

As my last post showed, I hope, my interest in the aesthetic-imaginative has not diminished my commitment to the archival-documentary (or my admiration for projects like these or Oppenheimer’s The Art of Killing that so artfully bleed the one into the other).

In that vein, I’ve returned to the incident I discussed last time – the US combat helicopter attack on unarmed civilians in New Baghdad in July 2007 – and started to compare what happened there with the even deadlier attack on three vehicles carrying civilians down a dusty mountain road in Uruzgan, Afghanistan in February 2010 which I discussed in “From a view to a kill” (DOWNLOADS tab) (that strike was also carried out by US attack helicopters, but the vital ‘visual responsibility’ was the work of a surveillant Predator crew.)

Collateral Murder2

My intention is to work towards an extended essay on ‘Militarized vision‘ that will, I hope, take critiques of the politics of vision beyond the full motion video feeds from drones. I’m working my way through transcripts of both incidents, the video clip of the Baghdad attack released by Wikileaks, and the military’s own investigations of both incidents.  The interrogations and conclusions from the investigations are crucial, I think, not only for providing additional information and even insight, but also for adding an understanding of the juridical layer involved in the scopic regimes at work.  The reports have much to tell us about what flight crews and ground troops saw (and didn’t see) on the days in question (above) and about what is possible for the military to see (and not see) after the event (below).  I’d already worked my way through the Uruzgan investigation in detail for The everywhere war, but re-reading it alongside what Wikileaks called “Collateral Murder” is proving to be an illuminating exercise.

New Baghdad %22MAM%22

More later, though my next posts on Chamayou (and what will be a separate post on the juridical individuation of later modern war) will provide some of the necessary context.

‘Un-Manning’

I don’t imagine that anyone who has seen it will ever forget the cockpit video of US Apache attack helicopters mowing down two Reuters journalists and ten other civilians in Baghdad in July 2007.  It was part of the cache that the principled and courageous Bradley Manning gave to Wikileaks, which released the full, unedited clip as Collateral Murder in 2010, and earlier this month Manning’s lawyers opened their defence with a showing of the same video.

The transcript of the video is here, and a redacted copy of the US Army’s investigation report (with annotated video stills) is here.

The incident has been the subject of two short documentary films, linked by a common figure, Ethan McCord, a US soldier who arrived at the scene minutes after the shooting began (more here).

The first is Shuchen Tan‘s Permission to engage, which won the Prix Europa for the best European TV investigation in 2012.  Here’s the trailer:

And here is the full (brilliant) film:

The second is James Spione‘s  Incident in New Baghdad, which won the prize for the best documentary short at the Tribeca Film Festival in 2011 and for best picture and best documentary short at the Fargo Film Festival in 2012.

Incident in New Baghdad

This is how Spione introduces his film:

Psychologists call it “psychic numbing.” Tell someone that tens of thousands of civilians have been killed in the Iraq conflict, or that thousands of U.S. veterans of our Mideast wars suffer from crippling PTSD, and their eyes will likely glaze over. Most people simply cannot comprehend the meaning of such vast numbers, nor are they likely to show any particular concern. Conversely, however, the tale of a single tragic incident can create great empathy in the same person–and greater understanding of the wider effects of war.

On April 5th, 2010, the controversial website WikiLeaks released a grainy black-and-white video that stunned the world. Recorded from the gunsight camera of an U.S. Army attack
helicopter during one of the most chaotic and deadly periods of the Iraq War, the footage depicts the violent deaths of two Iraqi journalists, Namir Noor-Eldeen and Saeed Chmagh,
along with at least eight other mostly unarmed individuals on the streets of Baghdad in July 2007. Minutes later on the video, when the driver of a passing van attempts to come to the aid of the mortally wounded Chmagh, a second helicopter attack occurs that destroys the van and kills several more people, wounding two small children in the process…

My short film INCIDENT IN NEW BAGHDAD examines what happened that day from the first-hand perspective of an American infantryman whose life was profoundly changed by his experiences on the scene. U.S. Army Specialist Ethan McCord bore witness to the devastating carnage, found and rescued the two children caught in the crossfire, and soon turned against the war that he had enthusiastically joined only months before. Denied psychological treatment in Iraq for his PTSD, McCord returned home, struggling for years with anger, confusion, and guilt over the war. When Wikileaks released the video of the incident, McCord was finally spurred into action, and began traveling the country, speaking out for the rights of PTSD sufferers and against the American wars in the Middle East.

However, there is so much more to the story, and I am now developing a more in-depth, feature-length examination of this incident that will include the perspectives of many more people involved in this incident: the infantry on the ground; the families of both Noor-Eldeen and Chmagh; the children, whose father was killed in front of them in the van, as well as their mother; and if possible, the 1-8 Cavalry Airborne gunner who pulled the trigger. My hope is that, by hearing from all of the first-hand participants of this tragic event, we may come to better understand the profoundly damaging consequences that ripple out through the lives of survivors over many years from just one so-called “engagement” in a war. And when we learn from all involved that this incident was not an aberration, but a commonplace occurrence over the course of many years, perhaps then we will start to understand those mind-numbing statistics, and feel the true moral scale of the damage, the wounds, the folly of a war of choice that never needed to happen.

I rehearse all this now for two reasons other than the shadow of sentencing that now hangs over Manning (though that is reason enough) .

First, the video at the dark heart of this incident – and these films – was not captured by a Predator or Reaper thousands of feet in the air and fed back to pilots, screeners and commanders thousands of miles away in the continental United States: this was close-in and immediate, and this raises important questions about scopic regimes and military violence that spiral far beyond the usual (and I think narrowly framed) debate over drones.

Approximate Target

Second, Incident in New Baghdad was part-financed by Carol Grayson, who became one of the film’s executive producers.  She is clearly a remarkable woman in all sorts of ways, not least because she has spent much (I suspect most) of her time since then working on a new documentary film project, The Approximate Target that charts ‘the human cost of remote control killing, the dangers of covert government policy and unaccountability in modern warfare.’  It’s been a long, difficult and continuing journey with seemingly no end of obstacles and obstructions: you can read more on her blog here.

BJCiq-vCMAAgpWe-1From what I’ve been able to discover – which is not as much as I’d like – the focus of the The Approximate Target appears to be on CIA-directed strikes in Waziristan.  But Carol’s most recent posting (today) includes a letter from a Yemeni civilian to President Obama and Yemen’s President Hamadi on the eve of their meeting at the White House.  The letter was released today by Reprieve.  In it, Faisal bin Ali Jabera,  young engineer who lost two of his relatives in a drone strike on Hadhramout last summer, writes:

Our family are not your enemy. In fact, the people you killed had strongly and publicly opposed al-Qa’ida. Salem was an imam. The Friday before his death, he gave a guest sermon in the Khashamir mosque denouncing al-Qa’ida’s hateful ideology. It was not the first of these sermons, but regrettably, it was his last…

Our town was no battlefield. We had no warning – our local police were never asked to make any arrest. My young cousin Waleed was a policeman, before the strike cut short his life…

Your silence in the face of these injustices only makes matters worse. If the strike was a mistake, the family – like all wrongly bereaved families of this secret air war – deserve a formal apology. To this day I wish no vengeance against the United States or Yemeni governments. But not everyone in Yemen feels the same. Every dead innocent swells the ranks of those you are fighting.

Theory of the drone 5: Vulnerabilities

This is the fifth in a series of posts on Grégoire Chamayou‘s Théorie du drone.  My next post on the book will consider Chamayou’s second section, ‘Ethos and psyche‘, in its entirety, and when I’ve worked my way through the book in separate, detailed posts (three more sections to go after the next one) I’ll provide a critical overview of the project as a whole: I hope that will help (I must be doing something right – or wrong – since these posts have been picked up by the splendid ARmy Rumour SErvice, which – despite its equally splendid acronym – is not quite a digital child of the Wipers Times).

8: Vulnerabilities

Far from being ‘unmanned’, each US Air Force combat air patrol (CAP) capable or providing coverage 24 hours a day 7 days a week involves a suite of four Predators (MQ1) or Reapers (MQ9) supported by a total of 192 personnel (the exact figures vary and are subject to change, but I’ve taken these from a June 2011 presentation by Colonel J.R. Gear, Director of the US Air Force’s Remotely Piloted Aircraft Task Force).

As you can see from his presentation slide below, most of these (133) are based outside the combat zone, and 84 of those are devoted to ‘PED’ –processing, exploiting and disseminating the feeds from the airborne sensors, especially the full-motion video (FMV) streams.

That leaves 59 who are forward deployed inside the combat zone: three pilots and three sensor operators to handle take-off and landing (which require a line-of-sight link to the aircraft because the Ku-band satellite link used for in-flight operations imposes a response delay that is too great for near-ground manoeuvres).  One of the four aircraft is held on the ground for maintenance and, given the technical problems that continue to dog what Jordan Crandall calls the wayward drone, no fewer than 53 people are involved in keeping them flying.  [More on drone crashes and glitches here, here and here].

Still, less than half the total complement (44 per cent) is in the combat zone, and all of them work from the relative safety of an airbase.

GEAR Manning Unmanned Aircraft

Hence the tag line repeatedly used by the US Air Force to advertise the core advantage of using drones: ‘projecting power without projecting vulnerability’:

Projecting power without vulerability

I’ve always liked to take metaphors stubbornly literally, and given what is happening to the polar ice we need to ask about the invulnerability of these remote operations.

Chamayou reminds us that in classical mythology and in fable invulnerability has always been a myth; so it is with the drone.  He distinguishes two sets of vulnerabilities, one technical and the other political-strategic.

(A) Technical

Chamayou says virtually nothing about the technical imperfections of the Predator and the Reaper, especially the crashes and other failures that I noticed above, but concentrates on two other issues.

(1) ‘Mastery of the air’: At present, Predators and Reapers can only operate in uncontested airspace; they are slow, noisy and far from agile, which makes them highly vulnerable to attack from ground-to-air missiles or conventional strike aircraft.  This is not a problem in Afghanistan – even during the invasion US Secretary of Defense Donald Rumsfeld was able to proclaim ‘air superiority’ by 10 October, just three days after launching the first attacks: ‘Afghan skies secure‘ – and according to some reports it never became a serious issue in Iraq either.  During Operation Southern Watch, tasked with enforcing no-fly zones over Iraq between the first Gulf War and the US-led invasion in 2003, Eric Reidel reported that

‘Predators were used as bait to stir up Iraqi fighters and air defenses. Surface-to-air missiles eventually brought down two of the drones and an Iraqi fighter jet shot down a third, but it didn’t come that easy to the enemy.’

But that was a contest against a military machine degraded by a sanctions regime.  What is now called A2/AD (anti-access, area denial) may well become a serious obstacle to future conflicts. In 2011 Colonel Dean Bushey, deputy director of the joint Unmanned Aircraft Systems Center of Excellence, told Reidel:

“We’re thinking about the next war, thinking about the next fight, thinking about the next campaign…  We’ve fought in a very permissive environment where there are no enemy attacks against our unmanned aircraft … It would be foolish for us to imagine that we could continue to fly unmanned systems in an environment that is not only friendly but is not GPS-denied, that is not communications-denied.”

With Obama’s ‘pivot to the Pacific’, the Pentagon has redoubled its efforts to harden its drones for combat (several commentators are sufficiently sceptical about the prospects that they see a renewed commitment to conventional strike-stealth aircraft rather than to UAVs).  But perhaps the sharper point is contained in Bushey’s final sentence, and Chamayou spends much more time on this second, vital vulnerability.

(2) ‘Mastery of the waves’: Chamayou documents a series of incidents in which signals were jammed or hacked.

In 2009 the Wall Street Journal reported that insurgents in Iraq had been using commercial off-the-shelf software (costing just $26) to intercept the video feeds from Predators for at least a year, and there was similar evidence from Afghanistan.  The Pentagon had known of the vulnerability since the aircraft were deployed over Bosnia in the 1990s, but had not bothered to encrypt the signals because they ‘assumed local adversaries wouldn’t know how to exploit it.’ You might think the solution – encryption of the Common Data Link feeding images to ROVERS (receivers) used by troops on the ground – would be easy, but four years after the story broke Noah Schachtman and David Axe reported that more than half the US fleet of Predators and Reapers were still broadcasting their video feeds in the clear:

”Standard unencrypted video is basically a broadcast to whoever can figure out the right carrier frequency, so essentially, we are simulcasting to battlefield commanders and the opposing force. If that opposing force knows we can see them and from where, they can take better evasive maneuvers.”

UT Adaptive Flight Hornet MiniIf signals transmitted from the drone can be hacked then, as Bushey noted, so can signals to the drone.  This is known as GPS spoofing, and the basic principle is remarkably simple; for a technical exposition that isn’t, see this research paper ‘On the requirements for successful GPS spoofing attacks’ by four Swiss computer scientists (who also propose counter-measures), but for a more user-friendly discussion see Pierluigi Paganini‘s excellent overview of ‘Hacking drones’ here.  As Chamayou says, the principle was put into practice in June 2012 , when a group of researchers from the Radionavigation Laboratory at the University of Texas at Austin successfully hijacked a small civilian helicopter-drone at the White Sands Missile Range in Nevada.  It was an experiment carried out for the Department of Homeland Security, the target was a tiny Adaptive Flight Hornet Mini (shown above) not a Predator or a Reaper, and the intercept took place at an altitude of less than 20 metres (60 feet) from a distance of 1 kilometre.  This year they intend to repeat the experiment but from a distance of 10 kilometres.  This is all part of an ongoing project to devise systems to disrupt spoofing, but Chamayou suggests that ‘the air pirates of the future’ will surely try to take control of larger drones from an even greater distance.

(B) Political-strategic

Here Chamayou is not addressing wider political, legal and ethical objections to which remote operations are indeed vulnerable – as I’ll describe in later posts – but rather the possibility of more direct responses to the deployment of drones.

SHAW The new Western way of war(1) Reprisals: Remote operations radicalise what Martin Shaw described in 2005 as The new Western way of war: ‘risk-transfer war‘.  Although Shaw emphasised global surveillance, the minimisation of military casualties and an overwhelming reliance on airpower amongst other things – and his ‘rules of risk-transfer war’ are still essential if depressing reading – it is a sign of how far the world has turned since then that he provided no discussion of remote operations or the incorporation of drones as essential vectors of later modern war.

Perhaps for this reason Chamayou makes no mention of Shaw, but fastens on a short thesis submitted in 2009 by Major Trent Gibson of the US Marine Corps for the Master of Military Studies from Quantico, ‘Hell-bent on Force Protection’.  This was a critique of what Gibson called ‘force protection fetishism’.  He traced it back to the US military’s experience in Vietnam but argued that it was alive and well in Afghanistan and Iraq.  In a key passage quoted by Chamayou, Gibson wrote:

‘Attempts to armorize our force against all potential enemy threats … shifts the ‘burden of risk’ from a casualty-averse military force onto the populace. In doing so, we have lifted that burden from our own shoulders and placed it squarely upon those who do not possess the material resources to bear it – the civilian populace.’

Gibson was reaffirming one of the central tenets of the new counterinsurgency doctrine issued three years earlier, and he doesn’t discuss drones and remote operations either.  But what both FM 3-24 and by extension Gibson objected to was the physical separation of troops from the very people they were supposed to protect.  One of its cardinal – strategic – weaknesses – was sequestering troops inside vast, heavily defended Forward Operating Bases from which they issued out on sporadic armoured patrols.  It was, in part, on overcoming this siege mentality that the so-called “Surge” in Baghdad was predicated (see “The biopolitics of Baghdad”: DOWNLOADS tab).  General David Petraeus‘s ‘Commander’s Guidance‘ could not have been plainer:

‘Live among the people. You can’t commute to this fight. Position Joint Security Stations, Combat Outposts, and Patrol Bases in the neighborhoods we intend to secure. Living among the people is essential to securing them and defeating the insurgents.’

UAV pilot driving to workRemote operations hypostatise that ‘commute to the fight’ (see here).  Here is one UAV pilot talking to Der Spiegel:

‘In the morning you carpool or you take a bus and drive into work, you operate for an eight-hour shift, and then you drive back home… Before you were at war 24/7, and when you’re home you’re home. This is different. I do e-mails in the morning, rush to the airplane, come out, go to the [Base Exchange], get myself a hamburger, do some more e-mail, do it again, drive home.’

I’ll say more about that compartmentalisation in my next post – it’s a central concern in the next section of Théorie du drone – but Chamayou’s central point here is that the safety of ‘home’ is illusory and that the war cannot be contained within external ‘danger zones’.  He’s not talking about insurgent attacks against US air bases or crew (though one recent story, ‘A day job waiting for a kill-shot a world away’, reported that ‘the Air Force, citing what it says are credible threats, forbids pilots to disclose their last names’).  What Chamayou has in mind is the possibility of reprisals within the continental United States more generally: risk transferred back to the American public at large.  He explicitly endorses the conclusion to Mike Davis‘s Buda’s Wagon: a brief history of the car bomb, where Davis writes:

‘… every laser-guided missile falling on an apartment house in southern Beirut or a mud-walled compound in Kandahar is a future suicide truck bomb headed for the center of Tel Aviv or perhaps downtown Los Angeles.’

This is not a wild scenario.  Here is Michael Boyle on the costs and consequences of drone warfare:

On 21 June 2010, Pakistani American Faisal Shahzad told a judge in a Manhattan federal court that he placed a bomb at a busy intersection in Times Square as payback for the US occupations of Afghanistan and Iraq and for its worldwide use of drone strikes. When the judge asked how Shahzad could be comfortable killing innocent people, including women and children, he responded: ‘Well, the drone hits in Afghanistan and Iraq, they don’t see children, they don’t see anybody. They kill women, children, they kill everybody. It’s a war and in war, they kill people. They’re killing all Muslims.’  In a videotape [below] released after his arrest, Shahzad revealed that among his motives for the attack on New York City was revenge for the death of Baitullah Mehsud, a Pakistani Taliban leader killed in a drone strike in August 2009. While his comments were reported in the American press, the Obama administration never acknowledged that it was revulsion over drone strikes—which Shahzad was rumoured to have seen at first hand when training with militant groups in Pakistan—that prompted his attack.

faisal-shahzad-martyrdom-tape

Although the incident would have strengthened his argument, Chamayou doesn’t mention it.  You can find more here; another video featured Pakistani Taliban leader Qari Hussain Mehsud claiming responsibility for what he described as retaliation against US drone attacks in the FATA (more detail here).

FUKUYAMA End of History(2) Re-purposing: Drones can be adapted for civilian use – they have been used to monitor herds of caribou and to track the progress of wild fires – and there is a rapidly expanding market for small DIY drones amongst geeks and hobbyists.  As Chamayou notes, after reading about the US Army’s small RQ-11 surveillance drone even Francis Fukyama built his own small surveillance drone in his backyard in February 2012.  What he doesn’t report, though, is the string of questions that Fukuyama raised in one of his early accounts of the project (Fukuyama now has three drones; updates including video here and here):

‘What will the world look like when not just the US but many other countries around the world operate fleets of drones; and when powerful, sophisticated drones are owned by lots of private individuals? What would our attitude be if our enemies could pick off visiting dignitaries as they stepped off the aeroplane in a supposedly friendly country, or attack soldiers in their bases in Europe or Asia? Or if Americans became vulnerable in Florida or New York? Drones might become an inexpensive delivery vehicle for terrorists or rogue states that can’t afford to deliver payloads in ballistic missiles. Some of the remotely controlled aeroplanes that hobbyists build are a third to half the size of their full-scale counterparts. As the technology becomes cheaper and more commercially available, moreover, drones may become harder to trace; without knowing their provenance, deterrence breaks down. A world in which people can be routinely and anonymously targeted by unseen enemies is not pleasant to contemplate.’

The last sentence is pretty rich: the world Fukuyama envisages is already a reality for thousands of people in Pakistan, Yemen, Somalia and elsewhere, and they have to do rather more than ‘contemplate’ it.

Still, these are Chamayou’s questions too.  It is precisely the proliferation, diffusion and and above all the down-sizing and down-marketing of small drones that interest him.  If they can be ‘demilitarised’ for civilian uses, including Fukuyama’s photographic obsessions, then he contends that it’s perfectly possible for them to be ‘re-militarised’ at remarkably low cost to constitute what Eugene Miasnikov was already calling six years ago ‘an army of suicide bombers on steroids’.  This may well be true – and, in a different vein, since October 2012 there have been (conflicting) reports of Israel shooting down two Iranian-made Hezbollah drones, so their adoption by non-state actors seems to be in train already – but it’s still a far cry from the hi-tech world of Predators and Reapers and the globalised killing machine for which they act as spears.

I’ll return to that world in my next summary and commentary on the book.

This completes my extended discussion of the eight chapters that form Part I of Théorie du drone: Techniques and tactics.

Theory of the drone 3: Killing grounds

This is the third in a series of posts on Grégoire Chamayou‘s Théorie du drone, in which I provide a detailed summary of his argument, links to some of his key sources, and reflections drawn from my soon-to-be-completed The everywhere war (and I promise to return to it as soon as I’ve finished this marathon).

5: Pattern of life analysis

Chamayou begins with the so-called ‘Terror Tuesdays‘ when President Obama regularly approves the ‘kill list’ (or disposition matrix) that authorises ‘personality strikes’ against named individuals: ‘the drones take care of the rest’.

a0018519784_2

But Chamayou immediately acknowledges that most strikes are ‘signature strikes‘ against individuals whose names are unknown but for whom a ‘pattern of life analysis‘ has supposedly detected persistent anomalies in normal rhythms of activity, which are read as signs (‘signatures’) of imminent threat.  I’ve described this as a militarized rhthmanalysis, even a weaponized time-geography, in ‘From a view to a kill’ (DOWNLOADS tab), and Chamayou also notes the conjunction of human geography and social analysis to produce a forensic mapping whose politico-epistemological status is far from secure.

The principal limitation – and the grave danger – lies in mistaking form for substance.  Image-streams are too imprecise and monotonic to allow for  fine-grained interpretation, Chamayou argues, and supplementing them by equally distant measures, like telephone contacts, often compounds the problem.  Hence Gareth Porter‘s objection, which both Chamayou and I fasten upon:

‘The phone numbers and call histories from those phones go into the database which is used to “map the networks.” But the link analysis methodology employed by intelligence analysis is incapable of qualitative distinctions among relationships depicted on their maps of links among “nodes.” It operates exclusively on quantitative data – in this case, the number of phone calls to or visits made to an existing JPEL target or to other numbers in touch with that target. The inevitable result is that more numbers of phones held by civilian noncombatants show up on the charts of insurgent networks. If the phone records show multiple links to numbers already on the “kill/capture” list, the individual is likely to be added to the list.’

This is exactly what happened in the Takhar attack in Afghanistan on 2 September 2010 that I’ve discussed elsewhere, relying on the fine investigative work of Kate Clark, and Chamayou draws attention to it too.   The general assumption, as Kate was told by one officer, seems to be that ‘”If we decide he’s a bad person, the people with him are also bad.”

Takhar For a better future.001

These necro-methodologies raise two questions that Chamayou doesn’t address here.

The first, as Porter notes, is that ‘guilt by association’ is ‘clearly at odds with the criteria used in [international] humanitarian law to distinguish between combatants and civilians.’  You can find a much more detailed assessment of the legality of signature strikes (and what he calls their ‘evidential adequacy’)  in Kevin Jon Heller‘s fine essay, ”One hell of a killing machine”: Signature strikes and international law’ [Journal of international criminal justice 11 (2013) 89-119; I discussed a pre-publication version here].

The geo-legal ramifications of these attacks reach far beyond the killing grounds.  Earlier this month in the High Court in London one man who lost five relatives in the air strike in Takhar (as you can see on the slide above, on an election convoy) challenged the legality of the alleged involvement of Britain’s Serious and Organised Crimes Agency (SOCA) in drawing up the kill-list, the Joint Prioritized Effects List, used by the military to authorise the attack: more herehere and here. (It was the presence of names on the list that triggered the faulty network analysis).

The second is the imaginary conjured up by the very idea of a ‘pattern of life’ analysis.  I’ve written before about the way in which the screen on which the full-motion video feeds from the Predators and Reapers are displayed interpellates those who watch what is happening on the ground from thousands of miles away, and I’ve emphasised that this isn’t a purely optical affair:  that it is an embodied, techno-culturally mediated process that involves a series of structured dispositions to view the other as Other (and often dangerous Other).   But these dispositions also reside in what we might think of as a grammar of execution.  To see what I mean, here is Micah Zenko:

‘Recently, I spoke to a military official with extensive and wide-ranging experience in the special operations world, and who has had direct exposure to the targeted killing program. To emphasize how easy targeted killings by special operations forces or drones has become, this official flicked his hand back over and over, stating: “It really is like swatting flies. We can do it forever easily and you feel nothing. But how often do you really think about killing a fly?”’

Hence, of course, ‘Bugsplat’ [according to Rolling Stone, ‘the military slang for a man killed by a drone strike is “bug splat,” since viewing the body through a grainy-green video image gives the sense of an insect being crushed’], and a host of other predatory terms (see also here) that distinguish between this mere (bare) life and what Judith Butler calls ‘a life that qualifies for recognition’.

state-violence-and-the-execution-of-lawBut the same result is achieved through the nominally neutral, technical-scientific vocabulary deployed in these strikes. Joseph Pugliese captures the grammar of execution with acute insight in another fine essay, ‘Prosthetics of law and the anomic violence of drones’, [Griffith Law Review 20 (4) (2011) 931-961; you can also find it in his excellent new book State violence and the execution of law]:

‘The term ‘heat signature’ works to reduce the targeted human body to an anonymous heat-emitting entity that merely radiates signs of life. This clinical process of reducing human subjects to purely biological categories of radiant life is further elaborated by the US military’s use of the term ‘pattern of life’…

‘The military term ‘pattern of life’ is inscribed with two intertwined systems of scientific conceptuality: algorithmic and biological. The human subject detected by drone’s surveillance cameras is, in the first scientific schema, transmuted algorithmically into a patterned sequence of numerals: the digital code of ones and zeros. Converted into digital data coded as a ‘pattern of life’, the targeted human subject is reduced to an anonymous simulacrum that flickers across the screen and that can effectively be liquidated into a ‘pattern of death’ with the swivel of a joystick. Viewed through the scientific gaze of clinical biology, ‘pattern of life’ connects the drone’s scanning technologies to the discourse of an instrumentalist science, its constitutive gaze of objectifying detachment and its production of exterminatory violence. Patterns of life are what are discovered and analysed in the Petri dish of the laboratory…

‘Analogically, the human subjects targeted as suspect yet anonymous ‘patterns of life’ by the drones become equivalent to forms of pathogenic life. The operators of the drones’ exterminatory attacks must, in effect, be seen to conduct a type of scientific ethnic cleansing of pathogenic ‘life forms’. In the words of one US military officer: “Our major role is to sanitize the battlefield.”’

Later modern war more generally works through relays of biological-medical metaphors – equally obviously in counterinsurgency, as I’ve described in “Seeing Red” and other essays (DOWNLOADS tab), where the collective enemy becomes a ‘cancer’ that can only be removed by a therapeutic ‘killing to make live’ (including ‘surgical strikes’) – and Colleen Bell has provided an illuminating series of reflections in ‘Hybrid warfare and its metaphors’ [in Humanity 3 (2) (2012) 225-247] and ‘War and the allegory of medical intervention’ [International Political Sociology 6 (3) (2012) 325-8].

This immunitary logic is clearly bio-political, and its speech-acts just as plainly performative, and Pugliese draws the vital conclusion:

‘As mere patterns of pathogenic life, these targeted human subjects effectively are reduced to what Giorgio Agamben would term ‘a kind of absolute biopolitical substance’ that can killed with no concern about the possibility of juridical accountability: they are ‘bare life’ that can be killed with absolute impunity. Anonymous ‘patterns of life’ signify in contradistinction to legally named persons; they exemplify the ‘ontological hygiene’ legislated by US government policy in order to secure the reproduction of the ‘principle of scarcity with respect to agency and personhood’.

‘Situated in this Agambenian context of the extermination of human life with absolute impunity, the Predator drones must be seen as instantiating mobile ‘zones of exception’…’

Which artfully brings me to Chamayou’s next chapter…

6: Kill-box

Chamayou notes that the ‘war on terror’ loosed the dogs of war from their traditional boundaries in time and in space: at once ‘permanent war’ and, as he notes, ‘everywhere war’.

But for Chamayou it is more accurate to speak of the world turned into a ‘hunting ground’ rather than a battlefield, and this matters because two different geographies (his term) are involved.  War is defined by combat, he explains, hunting by pursuit.  Combat happens where opposing forces engage, but hunting tracks the prey, so that the place of military violence is no longer defined by a delimited space (‘the battlefield’) but by the presence of the enemy-prey who carries with him, as it were, his own mobile halo of a zone of personal hostilities.

To escape, the quarry must make itself undetectable or inaccessible – and the ability to do so depends not only on physical geography (terrain) but also on political and legal geography.  For this reason, Chamayou argues, the US has rendered contingent the sovereignty of Pakistan because it (for the most part unwillingly) provides sanctuary to those fleeing across the border from Afghanistan.  In such circumstances, what becomes crucial for the hunter is not the military occupation of territory but the ability to control trans-border spaces from a distance through the instantiation of what Eyal Weizman called the politics of verticality that has since captured the attention of Stuart Elden [“Secure the volume: vertical geopolitics and the depth of power”, Political Geography 34 (2013) 35-51], Steve Graham [“Vertical geopolitics: Baghdad and after”, Antipode 36 (1) (2004) 12-23] and others.  For this to work, as Weizman shows in the case of occupied Palestine, air power is indispensable.

Chamayou suggests that the US has refined this capacity – in effect, finely calibrated the time and space of the hunt – through the concept of the kill-box.  I’m not so sure about this; the lineage of the ‘kill-box’ goes back to the USAF’s ‘target boxes’ [target boxes around An Loc in Vietnam in 1972 are shown below] – and two or three specified ‘boxes’ or ‘Restricted Operating Zones‘ were used to define the Predato’s’  ‘hunting grounds’ over North and South Waziristan that were tacitly endorsed by the Pakistan state.

Target boxes around An Loc 1972

The concept of the ‘kill box’ was formalised as a joint operations doctrine in the 1990s as part of the established targeting cycle: what Henry Nash famously described in another context as ‘the bureaucratization of homicide’.  Nash worked for the USAF Air Targets Division in the 1950s and 60s, identifying targets in the USSR for nuclear attack by US Strategic Air Command, but I doubt that Chamayou would dissent from using either the verb or the noun to describe the contemporary, non-nuclear kill-chain.  (In a later post I’ll explain how this technical division of labour feeds in to what Chamayou castigates as a ‘setting aside’, a dispersal of responsibility, which functions to separate an action from its consequences: this is aggravated by the remote-split operations in which drones are embedded, and is central to Chamayou’s critique).  Here is how the relevant military manuals incorporated the development of the kill box into the targeting cycle in 2009 (ATO = Air Tasking Order):

Kill Box Development

You can find more on kill-boxes and their operationalisation here.

Kill Box TTP

Chamayou doesn’t track the development of the concept, but since then the ‘kill-box’ has been supplanted or at least supplemented by the ‘Joint Fires Area’ as a way of continuing to co-ordinate the deployment of lethal force and allowing targets to be engaged without additional communication.  Within the grid of the JFA (shown below, taken from an essay by Major James Mullin on ‘redefining the kill box’) permission to fire in specified cells is established in advance; areas are defined, targeting intervals stipulated, and the time-space cells can be opened and closed as operations proceed.

It is this capacity that Chamayou seizes upon: within the kill box targets can be engaged at will, so that the kill box, he writes, ‘is an autonomous zone of temporary killing’ (cf. the ‘free fire/specified fires zone’ in Vietnam: see my discussion of Fred Kaplan‘s recent essay, ‘The world as a free-fire zone‘).

3-D representation of Joint Fires Area using Global Area Reference System

Chamayou implies that the schema has been further refined in contemporary counterinsurgency and counter-terrorism operations: the fact that the kill-box and its successor allow for dynamic targeting across a series of scales is crucial, he says, because its improvisational, temporary nature permits targeting to be extended beyond a declared zone of conflict. The scale of the JFA telescopes down from the cell shown on the right of the figure below through the quadrant in the centre to the micro-scale ‘keypad’ (sic) on the right.

Global Area Reference System

This is more than a grid, though; the JFA is, in effect, a performative space that authorises, schedules and triggers lethal action.  Chamayou: ‘Temporary micro-cubes of lethal exception can be opened anywhere in the world, according to the contingencies of the moment, once an individual who qualifies as a legitimate target has been located.’  Thus, even as the target becomes ever more individuated – so precisely specified that air strikes no longer take the form of the area bombing of cities in World War II  or the carpet bombing of the rainforest of Vietnam – the hunting ground becomes, by virtue of the nature of the pursuit and the remote technology that activates the strike, global.

KAPLAN World as Free-Fire Zone

The system I’ve described here is one adopted by the US military, and how far its procedures are used by other agencies outside established conflict zones is unknown to me and doubtless to Chamayou too.  Are these micro-cells used to specify individual compounds or rooms, as Chamayou suggests in a thought-experiment?  For him, however, it’s the imperative logic that matters, and here Kaplan’s tag-line (above) can provide the key explanatory exhibit: ‘to kill a particular person anywhere on the planet.’   The doubled process of time-space calibration and individuation is what allows late modern war to become the everywhere (but, contra Kaplan,  not the anywhere, because specified) war.

On the one side, then, a principle of what Chamayou calls precision or specification:  ‘The zone of armed conflict, fragmented into micro-scale kill boxes, reduces itself in the ideal-typical case to the single body of the enemy-prey: the body as the field of battle.’  Yet on the other side, a principle of globalisation or homogenisation: ‘Because we can target our quarry with precision, the military and the CIA say in effect, we can strike them wherever we see fit, even outside a war zone.’

This paradoxical articulation has sparked fierce debates among legal scholars – Chamayou cites Kenneth Anderson, Michael Lewis, and Mary Ellen O’Connell – over whether the ‘zone of armed conflict’ should be geo-centred (as in the conventional battlefield) or target-centred (‘attached to the body of the enemy-prey’). Jurists are thus in the front line of the battle over the extension of the hunting ground, he writes, and ‘applied ontology’ is the ground on which they fight.  I’ll have more to say about this on my own account in a later post.

Theory of the drone 2: Hunting

This is the second in a series of posts on Grégoire Chamayou‘s Théorie du drone.

3: Theoretical principles of man-hunting

Chamayou opens his discussion with a revealing vignette.  In 2005 Texas entrepreneur John Lockwood developed a website, Live-shot.com, which promised a ‘real-time on-line hunting and shooting experience’.  The cyber-hunter was after deer and other game kept for the purpose on a 300-acre ranch near San Antonio.

LiveShot

You might think that a more relevant example would be Wafaa Bilal’s Domestic Tension described in his Shoot an Iraqi: art, life and resistance under the gun:

‘For one month, Bilal lived alone in a prison cell-sized room in the line of fire of a remote-controlled paintball gun and a camera that connected him to internet viewers around the world. Visitors to the gallery and a virtual audience that grew by the thousands could shoot at him 24 hours a day.’

Wafaa Bilal, Domestic Tension

There is a wonderful discussion of the project and its wider implications for experimental geopolitics by Alan Ingram [‘Experimental geopolitics: Wafaa Bilal’s Domestic Tension‘] in the Geographical Journal 1788 (2) (2012) 123-133.  He explains that Bilal conceived Domestic Tension as a commentary on ‘remote control warfare’ after his brother had been killed in a strike by a US helicopter gunship called in by commanders watching a video feed from a Predator in the skies over Kufa.

But Lockwood’s venture is even more revealing, particularly when juxtaposed with Domestic Tension, because it involved real-time killing (of captive deer, antelope and other animals) and after a public outcry it was eventually banned.  A full report from the Washington Post is here. Even the National Rifle Association was up in – er – arms: its spokesperson declared,  ‘We believe that hunting should be outdoors and that sitting in front of a computer three states away doesn’t qualify as hunting.’  Chamayou’s translation of one police officer’s condemnation – “It’s not hunting.  It’s killing’ – becomes ‘It’s not hunting.  It’s murder’, which artfully raises the stakes, but you get the point, which is about the hue and cry that attended killing animals on line while ‘man-hunting by remote control’ attracted considerably less public attention: then, anyway.

Live Shot

To be fair, there were critics like Dale Jamieson who saw Live Shot as symptomatic of a wider issue:

“If you look at this as being kind of a continuum or slippery slope,” said Jamieson, “you have people who enjoy the act of killing and destruction in video games, you have people who enjoy killing animals over the Internet…. But of course the next step in this is that people start killing people over the Internet. That’s the worry.”

California state Senator Debra Brown was equally forthright in her condemnation:

“What happens if this technology gets expanded to other uses?” she said. “It’s actually pretty scary. What’s the line between real life and a video game? It has all the video game feel: It’s remote, it’s disconnected from the reality of it, the hunter doesn’t have to deal with any blood or wounding or tracking.”

Chamayou doesn’t track these responses, which surely sharpen his point, but he doesn’t really need to: I haven’t been able to find any critics who drew attention to the remote killings of people that were already taking place under the unblinking eye of US Predators in Pakistan and Yemen. (Incidentally, this chapter is illustrated by an image of a Predator firing a Hellfire missile; the photograph is all over the web – for example here – but, as James Bridle has shown, this now canonical image is in fact a Photo-shopped fake, ‘a computer-generated rendering of a drone … flying over an abstracted landscape’).

For Chamayou those targeted killings are the effects of an apparatus that he describes as militarized man-hunting.  He invokes George W. Bush’s line (in a speech at the FBI in February 2003) about the ‘war on terror’ being a ‘different kind of war’ that ‘requires us to be on an international manhunt’ to argue that that within a decade what seemed to most commentators at the time to be just a folksy Texan cowboy phrase had been converted into a state doctrine of non-conventional violence that combines elements of military and police operations  without fully corresponding to either.

He suggests that US Secretary of Defense Donald Rumsfeld was already playing with the possibilities of what Eyal Weizman has called thanatotactics. Rumsfeld was convinced that ‘Israeli techniques for dealing with Palestinian resistance could be simply scaled up.’  If the IDF had turned Gaza into a laboratory for targeted killing from the air, however, how could this be done by the Pentagon on the global scale?  And – for some Pentagon insiders at least – how could this be done without having a new Phoenix program rise from the flames of what one adviser was already calling ‘preventive manhunting’?

CRAWFORD ManhuntingThis is where those ‘theoretical principles’ start to emerge.  Some of the most difficult issues concern the provision of a legal armature, as I’ll discuss in a later post (and it is these that interest me the most), but what Chamayou has more directly in mind here is the formulation of a military (rather than policing: the difference, as we’ll see, is crucial) doctrine to guide these operations.  He suggests that its most developed form drew upon the work of a private-sector consultant, George Crawford, who published Manhunting: reversing the polarity of warfare in 2008 and a subsequent report for the Joint Special Operations University, Manhunting: counter-network organization for irregular warfare  in 2009.

CRAWFORD Manhunting 2

Crawford’s report included a ‘chronology of American manhunting operations’, and out of that remarkably long history Chamayou fastens on the Pancho Villa Expedition in 1916.  This was a massive (and spectacularly unsuccessful) ground operation across the US/Mexico border, in which thousands of US troops under the command of General Pershing penetrated deep into Mexico in an effort to capture the Mexican revolutionary leader Pancho Villa (who had conducted a series of cross-border raids into New Mexico).

Chamayou doesn’t mention it, perhaps because it would complicate the clean lines of his narrative, but the expedition included air support from the eight planes of the 1st Aero Squadron (below) in what was to become ‘the first combat engagement of American Army pilots and airplanes’ (more here and here).  Their principal function, as with the use of military aircraft on the Western Front, was reconnaissance, but if this was a distant forerunner of US aerial surveillance of the southern border it was a dismal failure.  According to Pershing:

“[T]he aeroplanes have been of no material benefit so far, either in scouting or as a means of communication.  They have not at all met my expectations.  The further south Villa goes into the mountains the more difficult will be their tasks, and I have no doubt we shall soon be compelled to abandon them for either scouting the enemy or keeping in touch with the advance columns.”

HighFlight-1stAeroSqn9-1

But the entire expedition was a failure, and the crucial lesson, spelled out by Crawford and repeated by Chamayou, was the imperative to reverse the polarity: instead of deploying large numbers of ‘boots on the ground’ – what Crawford ridiculed as using an elephant gun to swat ‘the terrorist mosquito’ – operations against non-state actors should be conducted by small teams networked into a targeted killing operation.  This changes the terms of war not so much because the conflict is asymmetric, or even because it’s not about territorial gain, but rather because war is transformed from the classical paradigm of a duel into something quite other: ‘a hunter who advances, and a prey who flees or hides’.

The (tactical) rules of the game are quite different; the hunter must engage to win, while the fugitive must evade to win.  Crawford:

Firepower becomes less significant in terms of mass, while the precision and discretion with which firepower is employed takes on tremendous significance, especially during influence operations. Why drop a bomb when effects operations or a knife might do? Maneuver adopts new concept and form. In manhunting, friendly forces seek to engage the enemy. Like a lone insurgent, the enemy seeks to avoid the allied force, biding time until he has an opportunity to strike at vulnerable, unprotected, or noncombat assets.

The first task is thus not to immobilise but to identify and locate the enemy, which implies an apparatus of detection.  ‘Man-hunting’ thus becomes, in Crawford’s eyes at any rate, an intelligence-based operation directed towards identifying pivotal nodes (which is to say key leaders or ‘High Value Targets’) in the virtual and physical spaces of social networks.  Here Chamayou cites John Dodson‘s attempt – one of countless others – to provide a statistical methodology for ‘man-hunting’:

‘Nexus Topography is an extension of the common practice of Social Network Analysis (SNA) used to develop profiles of [High Value Targets]. Currently, SNA examines the links in a social group, whereas, Nexus Topography is a template that can be used to construct a map of relationships in different social environments. Nexus Topography maps social forums or environments, which bind individuals together (this can be extended to include Dark Networks and Small Worlds).

Network analysis, in multiple forms, is a staple of geo-spatial intelligence and contemporary counterinsurgency and counter-terrorism.  But how far Crawford’s specific proposals directly informed US military operations is another question, and one Chamayou doesn’t address.  I suspect their influence was at best indirect.  Even so, pursuing their logic enables Chamayou to conclude that militarized man-hunting is not about responding to specific attacks but instead providing ‘pre-emptive security’ against emergent threats.  On this new terrain ‘war’ becomes a vast campaign of extra-judicial killing, for which (as he says) the ‘Predator’ and the ‘Reaper’ live up to their names.  Hence the next chapter,which traces the next set of principles:

4: Surveillance and annihilation

FOUCAULT Surveillir et punirThe English translation doesn’t capture Chamayou’s substitution, which is a play on the French title of Michel Foucault‘s Discipline and punish: Surveillir et punir.

The reference to Foucault is entirely apposite.  Chamayou’s central point here is that, within the apparatus of militarized man-hunting, ‘detection’ is above all a visual modality (and much of Foucault’s work involved a sustained interrogation of the gaze). Chamayou argues that drones promise something like a ‘God’s eye view’; their protagonists claim that their near real-time, full-motion and increasingly high-definition video feeds have revolutionised the capacity to provide a constant view of the enemy.

This is all familiar ground, to me at any rate, and in this chapter Chamayou draws on my own work (and others’) to tease out six core principles.  I discuss all of them in ‘From a view to a kill’ and ‘Lines of descent’ [DOWNLOADS tab], so here I will simply list them in summary form:

1: Persistent stare or permanent watch – Predators and Reapers have long ‘dwell-times’ and in principle permit protracted surveillance;

2: Totalisation of perspectives or synoptic view – ‘wide-area surveillance’  promises to be able to ‘quilt’ multiple images together;

3: Complete archive – the question of data retrieval and analysis is immensely difficult, which is why the US Air Force has consistently worried about ‘swimming in sensors, drowning in data’, and why specialist image analysts have experimented with TV/video archival and retrieval techniques;

4: Data fusion from multiple sensors;

5: ‘Pattern of life’ analysis;

6: Detection of anomalies and pre-emption.

The classical names given to these new political technologies of vision – like Gorgon Stare and Argus (in Greek mythology the hundred-eyed giant, which in DARPA-speak becomes Autonomous Real-time Ground Ubiquitous Surveillance) – confirm the premium placed on visibility or even hypervisibility.

Gorgon Stare

But Chamayou argues that this political technology is far more ‘economical’ than Bentham’s Panopticon, which Foucault uses so powerfully to figure modern surveillance, because it requires neither spatial partitions nor architectural demarcations. It is what Zygmunt Bauman might call a ‘liquid’ technology, since it needs only airspace to function (though the current interest in A2/AD (‘anti-access/areal denial’) is a sharp reminder that at present – and even for the foreseeable future – Predators and Reapers can only hunt in uncontested air space).

And even more unlike the Panopticon, this political technology is not directed towards enclosure or confinement.  Just as the Gorgon’s stare petrified its enemies to death, turning them into stone, so this too is a deadly gaze. Video feeds trigger missile launches: ‘No longer surveillir et punir but surveiller et anéantir’ (annihilation) (p. 67).

(Incidentally, how far the US will continue to fund some of these systems is unclear: recent reports suggest that the Pentagon is scaling back its funding for the Gorgon Stare, but the Air Force is still promoting the ARGUS-IS as its next-generation sensor technology).

Living Under DronesThe shadows cast by these capacities are far longer than the supposedly ‘precision strikes’ they facilitate: they impose a new landscape of threat and dread. Here Chamayou invokes the Stanford/NYU report Living under drones (2012) to conclude that the presence of Predators and Reapers terrifies whole populations who live under them (see also my commentary here).  Above and beyond the deaths and physical injuries they inflict, and the rubble, the rage and the bereavements they produce, Chamayou concludes that drones also produce ‘a psychic enclosure whose boundaries are no longer defined by bars, barriers or walls but by the invisible circles described overhead by the ceaseless gyrations of these flying sentinels’ (literally, ‘watch-towers’).

As Chamayou’s patient excavation of these various principles proceeds, it becomes clear that the ‘doctrine’ that is coming in to view is much more than doctrine as the military understands the term.  For the Pentagon, doctrine consists of those ‘fundamental principles by which the military forces or elements thereof guide their actions in support of national objectives. It is authoritative but requires judgment in application.’  The appeal to its authoritative status is significant, of course, and speaks directly to (or rather from) from the military chain of command.

CHAMAYOU ManhuntsBut what Chamayou is after in what elsewhere he calls ‘the manhunt doctrine‘ is something that transcends the military (this form of ‘man-hunting’ deliberately blurs the distinctions between conventional military and police operations to produce what Chamayou calls ‘hybrid operations, monstrous offspring [enfants terribles] of the police and the military, of war and peace’) and seeks to expose the political technologies, the discursive systems and the scopic regimes from which it derives its wider authority and through which it exercises its powers.

In doing so it follows directly from his previous work, Les chasses à l’homme (in English, Manhunts), which promises a philosophical history – or, as I said in my previous post, a genealogy.  But Théorie du drone is more than the next chapter, because it has much to say about the transformation of ‘techno-war’ into something radically different, a modality of later modern war that is focused more than ever on the identification, pursuit and elimination of individuals.

To be continued.

Theory of the drone 1: Genealogies

Grégoire ChamayouThis is the first of a series of posts as I work my way through Grégoire Chamayou‘s Théorie du drone (2013), which has finally arrived on my desk.  I’ve loosely summarised the project and its relation to Chamayou’s previous work before, and in these notes I’ll combine a summary of his argument with some extended readings and excerpts from his sources and some comments of my own.  I hope readers will find these useful; they are an aide-memoire for me, and a way of working out some of my own ideas too, but do let me know if all this is helpful (especially for those with no French).

I’m pleased to say that he draws on several of my essays about drone warfare, including ‘From a view to a kill’, ‘Lines of descent’, and even ‘The everywhere war’ (all available under the DOWNLOADS tab), so I won’t re-trace in any detail our (considerable) common ground.

The first section of Theory of the drone is devoted to Techniques and Tactics and, as I noted previously, it’s good to read a philosopher engaging with the materialities and corporealities of contemporary war in such close detail.  I’ll start with the first two chapters, which read together provide some more lines of flight for today’s remote operations.  I don’t call these ‘genealogies’ lightly: as you’ll see next time, there are definite and deliberate echoes of Foucault in the argument (though Chamayou is no disciple).

1: ‘Methodologies for hostile environments’

It’s become a truism to say that drones are ideally suited for ‘dirty, dangerous or difficult’ tasks, and Chamayou begins with an interesting article written by John W. Clark for the New Scientist in 1964 on ‘Remote control in hostile environments’.

Clark described the development of technologies ‘of manipulation at a distance – what he called ‘telechirics’ (a term that Chamayou appropriates for his own purposes, from the Greek tele meaning ‘distance’ and kheir meaning ‘hand’) – so that people no longer had to expose themselves to danger to earn a living: from the extremes of outer space, exposure to nuclear radiation and deep ocean exploration to more mundane, everyday projects like fire-fighting, tunnelling, or mining. The key advance was the use of ‘a vehicle operating in the hostile environment under remote control by a man in a safe environment’.

Clark emphasised the remoteness – ‘there is no direct connection between the operator and his machine’ – because in his view the system depended on the capacity of the human operator ‘to “identify himself” with his remotely-controlled machine, even though it may be completely non-anthropomorphic in appearance and configuration’. In effect, Clark wrote, ‘his consciousness is transferred to an invulnerable mechanical body’ which implies, in turn, that ‘systems of this type are no substitutes for human judgment’. (For this reason, while Clark believed that a ‘telechiric system’ could be provided with a variety of sensors, vision – ‘by far our most valuable sense’ – was typically provided through a single-channel, closed-circuit television system). Indeed, the capacity for judgment is enhanced by partitioning space, as Chamayou notes, placing the operator in a ‘safe zone’ outside the ‘danger zone’.  The danger zone is a site of surveillance and intervention (‘by a cable or by a radio-link’), Chamayou underlines, but not a site of habitation.

It’s not difficult to see how these propositions can be carried over to the use of  combat drones.  Interestingly, Clark had been employed by the Hughes Aircraft Company where he originally developed his ideas on ‘remote handing’ (what he then called mobotry). He had noted that ‘the electronic techniques which have been developed in recent years, primarily in connection with guided missiles and radar, are finding increasing application in connection with remotely controlled systems for accomplishing physical operations within areas which are uninhabitable due to the presence of a hostile environment’, and in the closing section of the research paper he noted that ‘a remotely-controlled street-sweeper employing television for guiding and steering and a simple frequency coded command system has recently completed successful tests.’

Where? The Air Force Special Weapons Center in Albuquerque, which was dedicated to R& D of atomic and other ‘unconventional’ weapns (which was presumably not especially interested in keeping the streets clean).  And at the end of the 1980s Clark’s old employer, Hughes Aircraft, would buy a fledgling drone manufacturing company, Leading Systems, from Abe Karem (‘the dronefather‘), and then promptly sell it on to General Atomics which, with Karem’s assistance, became the company responsible for the Predator.

These details are not included in Chamayou’s discussion – and I don’t mean this as a criticism: I admire both the brevity and the clarity of his account – and in fact no links to the military appeared in the New Scientist article. But Chamayou has found a subsequent, anonymous and remarkably telling comment on the article. Among the scenarios canvassed by Clark, this contributor wrote, one was conspicuous by its absence:

‘The minds of telechiricists are grappling with the problems of employing remotely-controlled machines to do the peaceful work of man amid the hazards of heat, radiation, space and the ocean floor. Have they got their priorities right? Should not their first efforts towards human safety be aimed at mankind’s most hazardous employment – the industry of war?… Why should twentieth-century men continue to be stormed at by shot and shell when a telechiric Tommy Atkins could take his place? ‘All conventional wars might eventually be conducted telechirically, armies of military robots battling it out be remote control, victory and defeat being calculated and apportioned by neutral computers, while humans sit safely at home watching on TV the lubricating oil staining the sand in sensible simile of their own blood.’

Sand? Chamayou doesn’t mention it [‘sand’ in his French translation becomes ‘dust’], but in fact the anonymous author opened his commentary by noting that the publication of Clark’s original article ‘coincided with the flare-up in the Yemen…’  The ‘flare-up’ was part of a civil war in Yemen, in which royalists (supported by Saudi Arabia) were pitted against republicans (supported by Egypt) and Britain was engaged in a series of irregular, covert operations that were repeatedly denied in Parliament.

And so it’s no accident, I think, that the anonymous contributor goes on to emphasize the importance of telechirics for asymmetric warfare:

‘Far-flung imperial conquests which were ours because we had the Maxim gun and they had the knobkerrie will be recalled by new bloodless triumphs coming our way because we have telechiric yeomanry and they, poor fuzzy-wuzzies, have only napalm and nerve-gas.’

By this means, Chamayou concludes, asymmetric warfare becomes unilateral: people still die, to be sure, but on one side only.  And, as those hideous remarks I’ve just quoted make plain, the divide is profoundly racialized.

2: Genealogy of the Predator

My own inclination would be to make that plural – genealogies – and to identify multiple lines of descent, some of which (I think plausibly) can be traced back to the early twentieth century.

But Chamayou excludes many of them, including ‘target drones’ and – more directly relevant – various ‘aerial torpedoes’, which he sees as forerunners of the cruise missile (which can only be launched once) rather than the combat drone (which can be used many times over). This distinction is useful, but it’s complicated by Project Aphrodite’s experiments with explosive-filled US bombers in the dog days of the Second World War, whose use of remote control and visual links – they’ve sometimes been called ‘video bombers’ – anticipates key elements of today’s remote operations (see also herehere, here and here).

Chamayou does notice the American use of drones for aerial surveillance over North Vietnam – though he makes nothing of other elements, including the development of ‘pattern of life’ analysis and the installation of the sensor-shooter systems of the ‘electronic battlefield’ along the Ho Chi Minh Trail, both of which (as I argued in ‘Lines of descent’) were key elements in the much later development of unmanned aerial systems.

But these developments came to nothing, Chamayou contends, and in the 1970s the development of military drones was virtually abandoned by the US: it was Israel that showed the way to the future.

During the Yom Kippur War of 1973 the Israelis used ‘decoy drones’ to draw the fire of missile batteries and then sent in conventional strike aircraft before the Egyptians could re-load: Chamayou doesn’t note it, but those drones were designed and built in under a month by Abe Karem and his team.  In 1982 the IDF repeated the tactic against Syrian batteries defending Palestinian strongholds in the Bekaa Valley.

NYT Beirut barracks bombing 1983But Israel literally showed the US the way to the future in another, much more remarkable incident in 1983. Here is the original account (by Jim Schechter) on which Chamayou draws from Popular Science in October 1987:

‘Two days after a terrorist bomb destroyed the [US] Marine barracks in Beirut in October 1983, Marine Commandant Gen. P. X. Kelley secretly flew to the scene. No word of his arrival was leaked. Hours later in Tel Aviv the Israelis played back the tape for the shocked Marine general. The scene, they explained, was transmitted by a Mastiff RPV circling out of sight above the barracks.’

Peter Hellman in ‘The little airplane that could’ (in Discover, February 1987) fills in some of the details.  Kelley ‘had been photographed during his outdoor movements in Beirut — his head targeted in cross hairs‘ (my emphasis).  He explains:

‘Unobserved by the Marines, a miniaturized Israeli RPV (remotely piloted vehicle) called Mastiff had circled 5,000 feet overhead during Kelley’s visit. Despite its twelve-foot wing span (just a shade longer than a California condor’s), at that altitude the Mastiff couldn’t be seen by the naked eye. And with its fiber-glass body, it was almost impossible to detect by radar. Nor could the putt-putt of its two-cylinder 22-horsepower engine be heard. But a zoom-lensed video camera peering down from a clear plastic bubble in its belly had a splendid view of the touring general. On a signal from controllers more than 50 miles away, the mini-RPV left as furtively as it had come, and flew into a net set up outside its mobile ground station.

As Schechter laconically put it, the Americans got the message, and in the 1980s their interest in developing remotely piloted aircraft for ISR (intelligence, surveillance and reconnaissance) dramatically increased.

There are all sorts of other connections between the US and Israel when it comes to both the development of UAVs and their later use for targeted killing.  What Chamayou is most interested in is precisely the development of UAVs as hunter-killers, which (as I’ll explain in my next post in the series) he links to the transformation of warfare into man-hunting.  And, as I’ll try to show, that’s when things start to get extremely interesting…

Drones and civilian casualties in Afghanistan

I’ve been urging for some time now that the debate over drone strikes must not neglect what has been happening in Afghanistan: hence “From a view to a kill” (DOWNLOADS tab) and the much longer version to appear in The everywhere war.  According to a report on the Guardian website posted late on Tuesday by the resourceful Spencer Ackerman, ex-Danger Room (now sadly itself an ex-site), ‘A study conducted by a US military adviser has found that drone strikes in Afghanistan during a year of the protracted conflict caused 10 times more civilian casualties than strikes by manned fighter aircraft.’  The period under analysis (from mid-2010 to mid-2011) followed a series of measures announced by General Stanley McChrystal to reduce civilian casualties from air operations, and coincided with a dramatic increase in the number of drone strikes (which continued to increase through 2012).

The study in question was carried out by Larry Lewis for the Joint Coalition and Operational Analysis (JCOA), a division of the Joint Staff J7 whose work is summarised in the following slide (which comes not from Edward Snowden‘s cache but from here):

JCOA

Notice ‘Civilian casualties in Afghanistan’ is #6 on the list of major studies.  The completed study is called Drone Strikes: Civilian Casualty Considerations and, apart from the Executive Summary that was published on 18 June, remains classified.  The opening paragraph is the primary source for Spencer’s story, and here it is:

‘The US government has described drone airstrikes in operations outside declared theaters of armed conflict as surgical and causing minimal civilian casualties. Analysis of air operations in Afghanistan, combined with a review of open-source reports for drone strikes in Pakistan, suggest that these fell short of intended goals. Specifically, drone strikes in Afghanistan were seen to have close to the same number of civilian casualties per incident as manned aircraft, and were an order of magnitude more likely to result in civilian casualties per engagement. Specific causal factors were identified that contributed to the relative propensity of drones to cause civilian casualties. Tailored training that addresses these causal factors could aid in reducing civilian casualties in engagements involving drones. While processes and operating forces in Afghanistan can differ from those in operations outside declared theaters of armed conflict, the factors above suggest that a dedicated analysis of civilian casualties in such operations would be worthwhile.’

The key sentence is in bold, and a version of it reappears in an essay, ‘Changing of the Guard: civilian protection for an evolving military’, that Lewis wrote with Sarah Holewinski, Executive Director of the Center for Civilians in Conflict and which appears in the latest issue of PRISM 4 (2) (2013), a journal of the Center for Complex Operations at the National Defense University (the press release from Civilians in Conflict is here).  The authors’ central concern is that ‘as Washington shifts its focus from counter-insurgency to counterterrorism, and from large-scale ground operations to more discrete and oftentimes-unmanned operations, the progress U.S. forces have made on preventing and mitigating civilian harm may soon be lost.’

They consider the risks attendant upon the increased reliance on Special Operations Forces – something that readers of Jeremy Scahill‘s Dirty Wars will need no warning of –  but also those that are likely to flow from an increased use of Unmanned Aerial Systems (UAS):

‘America’s use of force will increasing rely on new technologies, including air force capabilities to penetrate enemy defenses and strike over long distances. Unmanned Aerial Systems, sometimes referred to as “drones,” saw major use in Iraq and Afghanistan, and are slated for a big leap in funding. The Pentagon called for a nearly one-third increase in its fleet in the years ahead.

‘The use of UAS can have military advantages for avoiding civilian casualties in armed conflict, if used with that intent in mind. Their systems feature precision weapons, their sensors have increasingly high-resolution imagery to assess the ground situation, and back in the control room, trained imagery analysts scrutinize a target area prior to engaging, which isn’t always possible in a full ground operation.’

They list a series of familiar objections to the use of these remote platforms in areas outside ‘traditional combat theaters’, but they are also critical of  claims about their forensic capacity inside war-zones:

‘The assumption that UAS strikes are surgical in nature is … belied by research on recent combat operations in Afghanistan. There, UAS operations were statistically more likely to cause civilian casualties than were operations conducted by manned air platforms. One reason was limited training for UAS operators and analysts in how to minimize civilian harm. adding or improving training on civilian casualty prevention is a resource decision in direct tension with the increasing demand for more uaS and more operations, since additional training on civilian protection means time must be taken from somewhere else including the mission itself.’

They don’t say much about the reasons for this, except that they then criticise the ‘clandestine use of UAS by the US government’ because it raises ‘significant concerns that civilian casualties will not be properly monitored or investigated and thus called into question’ and then, several paragraphs later, they note that non-covert operations in Afghanistan ‘are replete with examples where all the engaged individuals were believed to be combatants, but a later investigation found many or all were civilians misidentified as combatants.’

Attachment TAB A (Part 22 of 28) FOIA 10-0218 Uruzgan - Pages 1751-1800 (dragged) 1

A key issue, then appears to be misidentification, and in my examination of one hideous incident in Uruzgan province in Afghanistan in February 2010 (in “From a view to a kill”; see also the image above) – an analysis I develop in my more detail in The everywhere war – I suggested that the high-resolution video feeds from these remote platforms engender an intimacy with ground troops that belies the physical remoteness of the drone operators.  They routinely claim to be not 7,500 miles from the battlespace but just 18 inches – the distance from eye to screen – and this immersive capacity (which these feeds do indeed share with videogames) predisposes them to view virtually every proximate Afghan action as hostile:

‘… the greater incidence of civilian casualties when close air support is provided to ‘troops in contact’ may result not only from time-critical targeting and its correspondingly ‘fewer checks to determine if there is a civilian presence’ … but also from the persistent presence of the [UAS] and its video feeds immersing its remote operators in, and to some substantial degree rendering them responsible for the evolving situation on the ground. This predicament, in which proximity not distance becomes the problem, cannot be resolved by tinkering with the Rules of Engagement; high-resolution imagery is not a uniquely technical capacity but part of a techno-cultural system that renders ‘our’ space familiar even in ‘their’ space – which remains obdurately Other.’

I don’t know if this forms part of the classified report, of course, but in an earlier report, Reducing and mitigating civilian casualties: enduring lessons (dated April 2013) Lewis emphasised the importance of using ‘discrimination tools’ in ‘situations where forces need to discern whether an individual is demonstrating hostile intent’ – but what he seemed to have in mind was another technological fix, ‘higher-resolution imagery or night vision devices’, whereas the root of the problem may well not be the power to see but the capacity to make sense of what is seen.

In any event two other questions remain.

First, during the period under analysis drone strikes accounted for around 5 – 6 per cent of total weapon releases by all aircraft in Afghanistan, but many of the conventional strikes nevertheless relied on persistent surveillance of targets from Predators or Reapers and then attacks by helicopters or fighter-bombers (which was the case in the Uruzgan attack).  Does Lewis’s statistical analysis shed any light on the difference (I assume there is one) between a UAS acting as a ‘hunter-killer’ and a UAS providing only real-time ISR as part of a networked operation?

Second, what is the difference between ‘an incident’ and an ‘engagement’ in the first extract I’ve quoted?  This is a substantive issue of considerable moment: if drone strikes produce a roughly similar number of civilian casualties as conventional strike aircraft ‘per incident’ but ten times the number ‘per engagement’, it’s vital to know the difference. Protagonists of remote operations will undoubtedly seize on the first, critics on the second.

I’m trying to chase down the difference. To be continued…

Dead streaming

Readers who have followed Josh Begley‘s Dronestream project – which I commented on here  – will be interested in this video of his graduate thesis presentation at NYU:

It’s a tour de force in under 15 minutes.  Josh begins with a rapid-fire overview of over 480 more or less covert US drone strikes in 10 years killing more than 4,700 people.  ‘What can our relationship be with this story?’ he asks.

His first attempt at finding an answer was the Drones+ app that was intended to send a notification to your iPhone every time news broke of a drone strike in Pakistan, Yemen or Somalia.  Like James Bridle‘s Dronestagram (which enabled satellite images of the sites of remote strikes to be viewed on an iPhone), it was a way of projecting the remoteness of the strikes into the intimacy of our own life-worlds.  But  Drones+ was more demanding precisely because its episodic notifications made those strikes more insistent, more interruptive.  Hence Josh’s key question:

‘Do we really want to be as connected to our foreign policy as we are to our smart phones?  … which are these increasingly intimate devices, the places where we share pictures of or loved ones and communicate with our friends, the things that we pull out of our pockets when we’re lost and which auto-magically put us at the center of the map……  Do we really want these things to be the site of how we experience remote war?’

Apple’s answer was no, as he ruefully acknowledges, though I suspect that would also be the answer of many others too: that, after all, is the appeal of remote wars to those who orchestrate them.  Out of sight, out of mind: which is precisely why there is also something ‘auto-magical’ about Josh’s determination to ‘détourne‘ these remote technologies like this.

Josh’s next step was to use a Twitter account to start to tweet every recorded drone strike, which eventually morphed (via the aggregations of the Bureau of Investigative Journalism) into Dronestream: or, more accurately, Dronestre.am.

Dronestre.am

This is a publicly accessible API (Application Programming Interface) that enables the data set to be interrogated and visualized in multiple ways (and if you want a simple account of working with the API, check out Felix Haas here):

dronestream

Josh credits Trevor Paglen‘s ‘spatial analysis’ and his ongoing attempts to outline the Blank Spots on the Map as a particular inspiration for his work.  What he has sought to do, by extension, is to map ‘the blank spots in the data’: to recover what he calls ‘the negative space that these drone strikes take up’, and so enable complex stories and ordinary voices to emerge out of the swirl of Big Data.  In doing so, he argues that it becomes possible to ‘speak back’ to the drones and to the masters of dirty wars that control them, in effect artfully turning this latest version of techno-war against itself.

The trick now is to fill out these ‘blank spots on the map’, to recover the insistently human geographies that are devastated by these air strikes and the threat of more to come, so that we can overturn both the ‘face-less’ and the ‘place-less’ narrative of the covert war machine.  It thrives on being both out of sight and out of site, and Josh’s research is invaluable in reminding us that the virtual technologies that make its depredations possible are also acutely material in their form and in their effects.