Under American Skies

I’ll be in Berlin in December for a conversation with James Bridle about drone wars and related issues, and I’m already looking forward to it since I’m a great admirer of his work. I particularly admire the way in which he challenges so many of our assumptions about ‘looking’ through his presentations about militarised vision and violence, and I’ve noted before the filiations between his various projects and Josh Begley‘s.

Tomas van HoutryveSo I was interested to read about photographer Tomas van Houtryves (right) project Blue Sky Days.  He begins with an arresting observation with which both James and Josh would be only too familiar:

‘Although a huge amount of [full motion video] footage has been collected [by US drones], the program is classified, and few people have ever seen images of the drone war and its casualties. This seems like a paradox in our thoroughly media-connected age. How can America be involved in a decade-long war where the sky is buzzing with cameras, and yet the public remains totally in the dark?’

But his response to the question is distinctly different: he repatriates the drone wars from Pakistan to the United States (here the most appropriate comparison is with Omar Fast‘s 5,000 Feet is the Best).

Tomas van Houtryve 1

To do so, Tomas travelled across America with a small quadcopter drone bought from Amazon.com attached to his camera.  His concept was simple, Rena Silverman explains in the New York Times:

Take the idea of foreign drone strikes and instead target similar domestic situations, putting them under surveillance using his drone in public spaces. He made a list of hundreds of different strike reports, gleaning as many details about the circumstances…

He rented a black car with tinted windows and placed himself, his drones, his batteries and lists in the car. He spent six weeks in late 2013 averaging between seven and 10 drone flights daily, sleeping in a different town every night. He would pull the car into an empty lot, get out, launch the drone for about five to 10 minutes — about as long as its power lasted — take footage, land the drone, drive away and recharge the batteries while en route to the next location…

He followed his list carefully, trying to imitate “signature strikes,” referring to a May 2012 New York Times article in which some State Department officials complained about the lax criteria for identifying a terrorist “signature.” The joke was that “three guys doing jumping jacks” could be enough suspicious activity for the C.I.A. to conclude it could be a terrorist training camp. In other words, targeting people based on behavior rather than identity.

Tomas van Houtryve 2 copy

He photographed people exercising in Philadelphia, their shadows long and pinned against the grid of a park. He noticed more “signature” behavior while driving through San Francisco, where he encountered a group doing yoga [above]. When Mr. van Houtryve recently printed the image, he asked viewers if they thought the subjects were praying or exercising. It was a toss-up.

Although these images are not quite ‘what drone attacks in America would look like’, as Pete Brook suggested in WIRED – Tomas’s drone was flying much lower (‘only about six stories high’) and these images are pin-point sharp: there’s none of the ambiguity of infra-red heat signatures here – none the less that last sentence really says it all.  Images do not speak for themselves and interpretation counts for everything – which is why, as I’ve repeatedly argued, it matters so much what pilots, sensor operators and image analysts are pre-disposed to see.

It turns out that a particular incident provoked Tomas’s project – the murder of Mamana Bibi at Ghunda Kala in North Waziristan on 24 October 2012, which I described here –  and also gives it its title.

Zubair RehmanIn October 2012, a drone strike in northeast Pakistan killed a 67-year-old woman picking okra outside her house. At a briefing held in 2013 in Washington, DC, the woman’s 13-year-old grandson, Zubair Rehman, spoke to a group of five lawmakers. “I no longer love blue skies,” said Rehman, who was injured by shrapnel in the attack. “In fact, I now prefer gray skies. The drones do not fly when the skies are gray.”

There’s more from Tomas at Harper’s here, which originally co-sponsored the project with the Pulitzer Center, and you can see more of his drone’s eye view images at the National Geographic here.

There’s also a revealing interview conducted by Bard College’s Center for the Study of the Drone here; it contains all sorts of interesting observations, but one in particular resonated.  Asked about the tension between the beauty of his photographic compositions and the horror of what he is seeking to convey, Tomas says this:

‘The base subject that I’m trying to raise awareness about and get people to think about in less abstract terms is the foreign drone war. If you take the time to read through the particular airstrikes, a lot of them are quite horrifying. But on the other hand, as a photographer, I know that beauty is one of the tools that we use to get people to look at a picture. Beauty has a lot of power, so there’s a tension between trying to seduce people with the language of photography, which is beautiful composition, and trying to reveal something that might be uncomfortable or difficult to digest, once people fully grasp it.’

Another of my art icons, elin o’Hara slavick, says something very similar about her mesmerising sequence of aerial images of places bombed by the US, Bomb after bomb (see also Brian Howe‘s discussion here and my own in ‘Doors in to Nowhere’ [DOWNLOADS tab], from which I’ve taken this passage):

‘She adopts an aerial view—the position of the bombers—in order to stage and to subvert the power of aerial mastery. The drawings are made beautiful “to seduce the viewer,” she says, to draw them into the deadly embrace of the image only to have their pleasure disrupted when they take a closer look. “Like an Impressionist or Pointillist painting,” slavick explains, “I wish for the viewer to be captured by the colors and lost in the patterns and then to have their optical pleasure interrupted by the very real dots or bombs that make up the painting.”’

A tart reminder that there are multiple ways of ‘just looking‘.

Theory of the drone 3: Killing grounds

This is the third in a series of posts on Grégoire Chamayou‘s Théorie du drone, in which I provide a detailed summary of his argument, links to some of his key sources, and reflections drawn from my soon-to-be-completed The everywhere war (and I promise to return to it as soon as I’ve finished this marathon).

5: Pattern of life analysis

Chamayou begins with the so-called ‘Terror Tuesdays‘ when President Obama regularly approves the ‘kill list’ (or disposition matrix) that authorises ‘personality strikes’ against named individuals: ‘the drones take care of the rest’.

a0018519784_2

But Chamayou immediately acknowledges that most strikes are ‘signature strikes‘ against individuals whose names are unknown but for whom a ‘pattern of life analysis‘ has supposedly detected persistent anomalies in normal rhythms of activity, which are read as signs (‘signatures’) of imminent threat.  I’ve described this as a militarized rhthmanalysis, even a weaponized time-geography, in ‘From a view to a kill’ (DOWNLOADS tab), and Chamayou also notes the conjunction of human geography and social analysis to produce a forensic mapping whose politico-epistemological status is far from secure.

The principal limitation – and the grave danger – lies in mistaking form for substance.  Image-streams are too imprecise and monotonic to allow for  fine-grained interpretation, Chamayou argues, and supplementing them by equally distant measures, like telephone contacts, often compounds the problem.  Hence Gareth Porter‘s objection, which both Chamayou and I fasten upon:

‘The phone numbers and call histories from those phones go into the database which is used to “map the networks.” But the link analysis methodology employed by intelligence analysis is incapable of qualitative distinctions among relationships depicted on their maps of links among “nodes.” It operates exclusively on quantitative data – in this case, the number of phone calls to or visits made to an existing JPEL target or to other numbers in touch with that target. The inevitable result is that more numbers of phones held by civilian noncombatants show up on the charts of insurgent networks. If the phone records show multiple links to numbers already on the “kill/capture” list, the individual is likely to be added to the list.’

This is exactly what happened in the Takhar attack in Afghanistan on 2 September 2010 that I’ve discussed elsewhere, relying on the fine investigative work of Kate Clark, and Chamayou draws attention to it too.   The general assumption, as Kate was told by one officer, seems to be that ‘”If we decide he’s a bad person, the people with him are also bad.”

Takhar For a better future.001

These necro-methodologies raise two questions that Chamayou doesn’t address here.

The first, as Porter notes, is that ‘guilt by association’ is ‘clearly at odds with the criteria used in [international] humanitarian law to distinguish between combatants and civilians.’  You can find a much more detailed assessment of the legality of signature strikes (and what he calls their ‘evidential adequacy’)  in Kevin Jon Heller‘s fine essay, ”One hell of a killing machine”: Signature strikes and international law’ [Journal of international criminal justice 11 (2013) 89-119; I discussed a pre-publication version here].

The geo-legal ramifications of these attacks reach far beyond the killing grounds.  Earlier this month in the High Court in London one man who lost five relatives in the air strike in Takhar (as you can see on the slide above, on an election convoy) challenged the legality of the alleged involvement of Britain’s Serious and Organised Crimes Agency (SOCA) in drawing up the kill-list, the Joint Prioritized Effects List, used by the military to authorise the attack: more herehere and here. (It was the presence of names on the list that triggered the faulty network analysis).

The second is the imaginary conjured up by the very idea of a ‘pattern of life’ analysis.  I’ve written before about the way in which the screen on which the full-motion video feeds from the Predators and Reapers are displayed interpellates those who watch what is happening on the ground from thousands of miles away, and I’ve emphasised that this isn’t a purely optical affair:  that it is an embodied, techno-culturally mediated process that involves a series of structured dispositions to view the other as Other (and often dangerous Other).   But these dispositions also reside in what we might think of as a grammar of execution.  To see what I mean, here is Micah Zenko:

‘Recently, I spoke to a military official with extensive and wide-ranging experience in the special operations world, and who has had direct exposure to the targeted killing program. To emphasize how easy targeted killings by special operations forces or drones has become, this official flicked his hand back over and over, stating: “It really is like swatting flies. We can do it forever easily and you feel nothing. But how often do you really think about killing a fly?”’

Hence, of course, ‘Bugsplat’ [according to Rolling Stone, ‘the military slang for a man killed by a drone strike is “bug splat,” since viewing the body through a grainy-green video image gives the sense of an insect being crushed’], and a host of other predatory terms (see also here) that distinguish between this mere (bare) life and what Judith Butler calls ‘a life that qualifies for recognition’.

state-violence-and-the-execution-of-lawBut the same result is achieved through the nominally neutral, technical-scientific vocabulary deployed in these strikes. Joseph Pugliese captures the grammar of execution with acute insight in another fine essay, ‘Prosthetics of law and the anomic violence of drones’, [Griffith Law Review 20 (4) (2011) 931-961; you can also find it in his excellent new book State violence and the execution of law]:

‘The term ‘heat signature’ works to reduce the targeted human body to an anonymous heat-emitting entity that merely radiates signs of life. This clinical process of reducing human subjects to purely biological categories of radiant life is further elaborated by the US military’s use of the term ‘pattern of life’…

‘The military term ‘pattern of life’ is inscribed with two intertwined systems of scientific conceptuality: algorithmic and biological. The human subject detected by drone’s surveillance cameras is, in the first scientific schema, transmuted algorithmically into a patterned sequence of numerals: the digital code of ones and zeros. Converted into digital data coded as a ‘pattern of life’, the targeted human subject is reduced to an anonymous simulacrum that flickers across the screen and that can effectively be liquidated into a ‘pattern of death’ with the swivel of a joystick. Viewed through the scientific gaze of clinical biology, ‘pattern of life’ connects the drone’s scanning technologies to the discourse of an instrumentalist science, its constitutive gaze of objectifying detachment and its production of exterminatory violence. Patterns of life are what are discovered and analysed in the Petri dish of the laboratory…

‘Analogically, the human subjects targeted as suspect yet anonymous ‘patterns of life’ by the drones become equivalent to forms of pathogenic life. The operators of the drones’ exterminatory attacks must, in effect, be seen to conduct a type of scientific ethnic cleansing of pathogenic ‘life forms’. In the words of one US military officer: “Our major role is to sanitize the battlefield.”’

Later modern war more generally works through relays of biological-medical metaphors – equally obviously in counterinsurgency, as I’ve described in “Seeing Red” and other essays (DOWNLOADS tab), where the collective enemy becomes a ‘cancer’ that can only be removed by a therapeutic ‘killing to make live’ (including ‘surgical strikes’) – and Colleen Bell has provided an illuminating series of reflections in ‘Hybrid warfare and its metaphors’ [in Humanity 3 (2) (2012) 225-247] and ‘War and the allegory of medical intervention’ [International Political Sociology 6 (3) (2012) 325-8].

This immunitary logic is clearly bio-political, and its speech-acts just as plainly performative, and Pugliese draws the vital conclusion:

‘As mere patterns of pathogenic life, these targeted human subjects effectively are reduced to what Giorgio Agamben would term ‘a kind of absolute biopolitical substance’ that can killed with no concern about the possibility of juridical accountability: they are ‘bare life’ that can be killed with absolute impunity. Anonymous ‘patterns of life’ signify in contradistinction to legally named persons; they exemplify the ‘ontological hygiene’ legislated by US government policy in order to secure the reproduction of the ‘principle of scarcity with respect to agency and personhood’.

‘Situated in this Agambenian context of the extermination of human life with absolute impunity, the Predator drones must be seen as instantiating mobile ‘zones of exception’…’

Which artfully brings me to Chamayou’s next chapter…

6: Kill-box

Chamayou notes that the ‘war on terror’ loosed the dogs of war from their traditional boundaries in time and in space: at once ‘permanent war’ and, as he notes, ‘everywhere war’.

But for Chamayou it is more accurate to speak of the world turned into a ‘hunting ground’ rather than a battlefield, and this matters because two different geographies (his term) are involved.  War is defined by combat, he explains, hunting by pursuit.  Combat happens where opposing forces engage, but hunting tracks the prey, so that the place of military violence is no longer defined by a delimited space (‘the battlefield’) but by the presence of the enemy-prey who carries with him, as it were, his own mobile halo of a zone of personal hostilities.

To escape, the quarry must make itself undetectable or inaccessible – and the ability to do so depends not only on physical geography (terrain) but also on political and legal geography.  For this reason, Chamayou argues, the US has rendered contingent the sovereignty of Pakistan because it (for the most part unwillingly) provides sanctuary to those fleeing across the border from Afghanistan.  In such circumstances, what becomes crucial for the hunter is not the military occupation of territory but the ability to control trans-border spaces from a distance through the instantiation of what Eyal Weizman called the politics of verticality that has since captured the attention of Stuart Elden [“Secure the volume: vertical geopolitics and the depth of power”, Political Geography 34 (2013) 35-51], Steve Graham [“Vertical geopolitics: Baghdad and after”, Antipode 36 (1) (2004) 12-23] and others.  For this to work, as Weizman shows in the case of occupied Palestine, air power is indispensable.

Chamayou suggests that the US has refined this capacity – in effect, finely calibrated the time and space of the hunt – through the concept of the kill-box.  I’m not so sure about this; the lineage of the ‘kill-box’ goes back to the USAF’s ‘target boxes’ [target boxes around An Loc in Vietnam in 1972 are shown below] – and two or three specified ‘boxes’ or ‘Restricted Operating Zones‘ were used to define the Predato’s’  ‘hunting grounds’ over North and South Waziristan that were tacitly endorsed by the Pakistan state.

Target boxes around An Loc 1972

The concept of the ‘kill box’ was formalised as a joint operations doctrine in the 1990s as part of the established targeting cycle: what Henry Nash famously described in another context as ‘the bureaucratization of homicide’.  Nash worked for the USAF Air Targets Division in the 1950s and 60s, identifying targets in the USSR for nuclear attack by US Strategic Air Command, but I doubt that Chamayou would dissent from using either the verb or the noun to describe the contemporary, non-nuclear kill-chain.  (In a later post I’ll explain how this technical division of labour feeds in to what Chamayou castigates as a ‘setting aside’, a dispersal of responsibility, which functions to separate an action from its consequences: this is aggravated by the remote-split operations in which drones are embedded, and is central to Chamayou’s critique).  Here is how the relevant military manuals incorporated the development of the kill box into the targeting cycle in 2009 (ATO = Air Tasking Order):

Kill Box Development

You can find more on kill-boxes and their operationalisation here.

Kill Box TTP

Chamayou doesn’t track the development of the concept, but since then the ‘kill-box’ has been supplanted or at least supplemented by the ‘Joint Fires Area’ as a way of continuing to co-ordinate the deployment of lethal force and allowing targets to be engaged without additional communication.  Within the grid of the JFA (shown below, taken from an essay by Major James Mullin on ‘redefining the kill box’) permission to fire in specified cells is established in advance; areas are defined, targeting intervals stipulated, and the time-space cells can be opened and closed as operations proceed.

It is this capacity that Chamayou seizes upon: within the kill box targets can be engaged at will, so that the kill box, he writes, ‘is an autonomous zone of temporary killing’ (cf. the ‘free fire/specified fires zone’ in Vietnam: see my discussion of Fred Kaplan‘s recent essay, ‘The world as a free-fire zone‘).

3-D representation of Joint Fires Area using Global Area Reference System

Chamayou implies that the schema has been further refined in contemporary counterinsurgency and counter-terrorism operations: the fact that the kill-box and its successor allow for dynamic targeting across a series of scales is crucial, he says, because its improvisational, temporary nature permits targeting to be extended beyond a declared zone of conflict. The scale of the JFA telescopes down from the cell shown on the right of the figure below through the quadrant in the centre to the micro-scale ‘keypad’ (sic) on the right.

Global Area Reference System

This is more than a grid, though; the JFA is, in effect, a performative space that authorises, schedules and triggers lethal action.  Chamayou: ‘Temporary micro-cubes of lethal exception can be opened anywhere in the world, according to the contingencies of the moment, once an individual who qualifies as a legitimate target has been located.’  Thus, even as the target becomes ever more individuated – so precisely specified that air strikes no longer take the form of the area bombing of cities in World War II  or the carpet bombing of the rainforest of Vietnam – the hunting ground becomes, by virtue of the nature of the pursuit and the remote technology that activates the strike, global.

KAPLAN World as Free-Fire Zone

The system I’ve described here is one adopted by the US military, and how far its procedures are used by other agencies outside established conflict zones is unknown to me and doubtless to Chamayou too.  Are these micro-cells used to specify individual compounds or rooms, as Chamayou suggests in a thought-experiment?  For him, however, it’s the imperative logic that matters, and here Kaplan’s tag-line (above) can provide the key explanatory exhibit: ‘to kill a particular person anywhere on the planet.’   The doubled process of time-space calibration and individuation is what allows late modern war to become the everywhere (but, contra Kaplan,  not the anywhere, because specified) war.

On the one side, then, a principle of what Chamayou calls precision or specification:  ‘The zone of armed conflict, fragmented into micro-scale kill boxes, reduces itself in the ideal-typical case to the single body of the enemy-prey: the body as the field of battle.’  Yet on the other side, a principle of globalisation or homogenisation: ‘Because we can target our quarry with precision, the military and the CIA say in effect, we can strike them wherever we see fit, even outside a war zone.’

This paradoxical articulation has sparked fierce debates among legal scholars – Chamayou cites Kenneth Anderson, Michael Lewis, and Mary Ellen O’Connell – over whether the ‘zone of armed conflict’ should be geo-centred (as in the conventional battlefield) or target-centred (‘attached to the body of the enemy-prey’). Jurists are thus in the front line of the battle over the extension of the hunting ground, he writes, and ‘applied ontology’ is the ground on which they fight.  I’ll have more to say about this on my own account in a later post.

Targeted killings and signature strikes

And so what Tom Junod calls the lethal presidency continues…  though it surely would have done whoever occupied the White House for the next four years.

Much of the discussion of US targeted killing has centred on both its status under international law and on the quasi-judicial armature through which various government agencies, including the Pentagon and the Central Intelligence Agency, draw up and adjudicate their kill lists of named individuals who are liable to a ‘personality strike’. But the majority of US targeted killings turn out to be ‘signature strikes’.

Signature strikes were initiated under President George W. Bush, who authorised more permissive rules of engagement in January/February 2008.  According to Eric Schmitt and David Sanger, writing in the New York Times,

[A] series of meetings among President Bush’s national security advisers resulted in a significant relaxation of the rules under which American forces could aim attacks at suspected Qaeda and Taliban fighters in the tribal areas near Pakistan’s border with Afghanistan.

The change, described by senior American and Pakistani officials who would not speak for attribution because of the classified nature of the program, allows American military commanders greater leeway to choose from what one official who took part in the debate called “a Chinese menu” of strike options.

Instead of having to confirm the identity of a suspected militant leader before attacking, this shift allowed American operators to strike convoys of vehicles that bear the characteristics of Qaeda or Taliban leaders on the run, for instance, so long as the risk of civilian casualties is judged to be low.

Under Obama signature strikes increased in frequency, and Micah Zenko notes that the President’s initial reluctance soon yielded to endorsement:

According to Daniel Klaidman, when Obama was first made aware of signature strikes, the CIA’s deputy director clarified: “Mr. President, we can see that there are a lot of military-age males down there, men associated with terrorist activity, but we don’t necessarily know who they are.” Obama reacted sharply, “That’s not good enough for me.” According to one adviser describing the president’s unease: “‘He would squirm … he didn’t like the idea of kill ‘em and sort it out later.’” Like other controversial counterterrorism policies inherited by Obama, it did end up “good enough,” since he allowed the practice to stand in Pakistan, and in April authorized the CIA and JSOC to conduct signature strikes in Yemen as well.

Today signature strikes are frequently triggered not on the fly – a sudden response to an imminent threat – but by a sustained ‘pattern of life’ that arouses the suspicion of distant observers and operators. This depends on persistent surveillance – on full motion video feeds and a suite of algorithms that decompose individual traces and networks – some of which involve a weaponized version of Hägerstrand’s time-geography: see, for example, GeoTime 5 here.

We know even less about the legal authority for these attacks, but Kevin Jon Heller has a new essay on their legality up at the wonderful open access resource that is SSRN [Social Science Research Network]  here, and there are preliminary responses at Opinio Juris here.  This is the abstract:

The vast majority of drone attacks conducted by the U.S. have been signature strikes – strikes that target “groups of men who bear certain signatures, or defining characteristics associated with terrorist activity, but whose identities aren’t known.” In 2010, for example, Reuters reported that of the 500 “militants” killed by drones between 2008 and 2010, only 8% were the kind “top-tier militant targets” or “mid-to-high-level organizers” whose identities could have been known prior to being killed. Similarly, in 2011, a U.S. official revealed that the U.S. had killed “twice as many ‘wanted terrorists’ in signature strikes than in personality strikes.” 

Despite the U.S.’s intense reliance on signature strikes, scholars have paid almost no attention to their legality under international law. This article attempts to fill that lacuna. Section I explains why a signature strike must be justified under either international humanitarian law (IHL) or international human rights law (IHRL) even if the strike was a legitimate act of self-defence under Article 51 of the UN Charter. Section II explores the legality of signature strikes under IHL. It concludes that although some signature strikes clearly comply with the principle of distinction, others either violate that principle as a matter of law or require evidence concerning the target that the U.S. is unlikely to have prior to the attack. Section III then provides a similar analysis for IHRL, concluding that most of the signature strikes permitted by IHL – though certainly not all – would violate IHRL’s insistence that individuals cannot be arbitrarily deprived of their right to life.

The most interesting section (for me) is Kevin’s discussion of ‘evidentiary adequacy’.  Most of the examples he discusses appear to be derived from CIA-directed strikes in Pakistan – drawing on the Stanford/NYU report on Living under drones – and, for that very reason, are remarkably limited. But we know much more about problems of evidence – and inference – from strikes conducted by the US military in Afghanistan…

The first point to make, then, is that targeted killings are also carried out by the US military – indeed, the US Air Force has advertised its ability to put ‘warheads on foreheads‘ – and a strategic research report written by Colonel James Garrett for the US Army provides a rare insight into the process followed by the military in operationalising its Joint Prioritized Effects List (JPEL). Wikileaks has provided further information about JSOC’s Task Force 373 – see, for example, here and here – but the focus of Garrett’s 2008 report is the application of the legal principles of necessity and proportionality (two vital principles in the calculus of International Humanitarian Law (IHL) discussed by Kevin) in counterinsurgency operations.  Garrett describes ‘time-sensitive targeting procedures’ used by the Joint Targeting Working Group to order air strikes on ‘high-value’ Taliban and al-Qaeda leaders in Afghanistan, summarised in this diagram:

Notice that the members included representatives from both Combined Joint Special Operations Task Force (CJSOTF) and the CIA (‘Other Government Agency’, OGA).  This matters because Joint Special Operations Command (JSOC) – once commanded by General Stanley McChrystal – and the CIA, even though they have their own ‘kill lists’, often co-operate in targeted killings and are both involved in strikes outside Afghanistan.  Indeed, there have been persistent reports that many of the drone strikes in Pakistan attributed to the CIA – even if directed by the agency – have been carried out by JSOC.  Here is Jeremy Scahill citing a ‘military intelligence source’:

“Some of these strikes are attributed to OGA [Other Government Agency, intelligence parlance for the CIA], but in reality it’s JSOC and their parallel program of UAVs [unmanned aerial vehicles] because they also have access to UAVs. So when you see some of these hits, especially the ones with high civilian casualties, those are almost always JSOC strikes.”

Garrett’s discussion clearly refers to ‘personality strikes’, but – second – the distinction between the evidential/inferential apparatus used for a ‘personality strike’ and for a ‘signature strike’ is by no means clear-cut.  Kate Clark‘s report for the Afghan Analysts Network describes the attempted killing of Muhammad Amin, the Taliban deputy shadow governor of Takhar province.  On 2 September 2010 ISAF announced that a ‘precision air strike’ earlier that morning had killed him and ‘nine other militants’.  The target had been under persistent surveillance from remote platforms – what Petraeus later called ‘days and days of the unblinking eye’ – until two strike aircraft repeatedly bombed the convoy in which he was travelling.  Two attack helicopters were then ‘authorized to re-engage’ the survivors. The victim was not the designated target, however, but Zabet Amanullah, the election agent for a parliamentary candidate; nine other campaign workers died with him. Clark’s painstaking analysis clearly shows that one man had been mistaken for the other, which she attributed to an over-reliance on ‘technical data’ – on remote signatures.  Special Forces had concentrated on tracking cell phone usage and constructing social networks. ‘We were not tracking the names,’ she was told, ‘we were targeting the telephones.’

This is unlikely to be an isolated incident.  Here for example is Gareth Porter:

‘…the link analysis methodology employed by intelligence analysis is incapable of qualitative distinctions among relationships depicted on their maps of links among “nodes.” It operates exclusively on quantitative data – in this case, the number of phone calls to or visits made to an existing JPEL target or to other numbers in touch with that target. The inevitable result is that more numbers of phones held by civilian noncombatants show up on the charts of insurgent networks. If the phone records show multiple links to numbers already on the “kill/capture” list, the individual is likely to be added to the list.’

In the Takhar case, despite informed protests to the contrary, ISAF insisted that they had killed their intended target (added emphases are mine):

PBS/Frontline screened a Stephen Grey/Dan Edge documentary on the Takhar incident last year, Kill/Capture, from which the images below are taken (reworked for my presentation on Lines of descent) and which, like Kate Clark’s remarkable report on which it drew, gave the lie to the ISAF statement; the film included an Afghan Police video of the aftermath of the attack: more here, video here, and transcript here.

Finally, there is a persistent propensity to read hostile intent into innocent actions. In ‘From a view to a kill’ (DOWNLOADS tab) I describe in detail an attack launched on 21 October 2010 near Shahidi Hassas in Uruzgan province in central Afghanistan.  In the early morning a Predator was tasked to track three vehicles travelling down a mountain road, several miles away from a Special Forces unit moving in to search a village for an IED factory.

The Predator crew in Nevada had radio contact with the Special Forces Joint Terminal Attack Controller and they were online with image analysts at the Air Force’s Special Operations Command headquarters in Florida. At every turn the flight crew converted their observations into threat indicators: thus the two SUVs and a pick-up truck became a ‘convoy’, cylindrical objects ‘rifles’, adolescents ‘military-aged males’ and praying a Taliban signifier (‘seriously, that’s what they do’).

After three hours’ surveillance two Kiowa helicopters were called in, and during the attack at least 23 people were killed and more than a dozen wounded.  Only after the smoke had cleared did the horrified Predator crew re-cognize the victims as civilians, including women and children.

I’m including a much fuller account in The everywhere war, based on a close reading of the redacted investigative report by Major General Timothy McHale released under a FOI request (the images above are all taken from my Keynote presentation based on the report), and you can also find David McCloud‘s spine-chilling analysis for the LA Times here.  But even in this abbreviated form it’s clear that the cascade of (mis)interpretations offered by the flight crew mimics Kevin’s list of ‘signatures’, where some would be categorised as ‘possibly adequate’ and others as ‘inadequate’.

All of these materials relate to air strikes inside a war zone, so that their modalities are different – in Afghanistan remote platforms like the Predator and the Reaper are one element in a networked ‘killing machine’, and they work in close concert with ground forces and conventional strike aircraft – and the legal parameters are not as contentious as those that govern ‘extra-territorial’ strikes in Pakistan, Somalia or Yemen (which are Kevin’s primary concern).  But they all raise questions about the evidential and inferential practices that are incorporated into the kill-chain that are clearly capable of wider application and concern.

Those questions raise other issues too.  It seems clear, from the examples I’ve given, that to isolate a single platform (the drone) is to contract the scrutiny of military and paramilitary violence that, under the conditions of late modern war, is typically networked.  And to determine the legal status of targeted killing must not foreclose on wider political and ethical decisions: to accept late modern war’s avowed reflexivity is too often to equate legality with legitimacy.