Unmanned Deterrence: Deterring Terrorism With Armed Drones

22-May-2013 • Chris C.


INTRODUCTION

The September 11, 2001 attacks placed al-Qa’ida firmly in the crosshairs of U.S. counterterrorism officials. Despite the efforts of U.S. servicemembers and counterterrorism officials alike, al-Qa’ida remains a threat to the U.S. As noted in the most recent National Strategy For Counterterrorism, “The preeminent security threat to the United States continues to be from al-Qa‘ida and its affiliates and adherents.”1 Having outlived the average life expectancy of a typical terrorist organization, and continuing to have its message resonate amongst some within the wider global Muslim community, the fight against al-Qa’ida threatens to persist into the foreseeable future.2 Transitioning away from unsustainable protracted approaches of combating terrorists, the U.S. will become more and more dependent upon light footprint approaches to counterterrorism. Seemingly, the method of choice for killing terrorists has become the use of armed unmanned aerial vehicles, commonly referred to as armed drones. Indeed, President Barack Obama has over septupled the frequency of drone strikes from the George W. Bush administration since he took office.3 With this marked increase in drone strikes has come domestic controversy and international scrutiny.

The root causes of the controversy center around issues of legality and human rights. However, domestic concerns over the transparency of their useage and worries about drone proliferation and norm setting are also frequently discussed in drone debates. In terms of legality, the U.S. has not satisfactorily, in many people’s eyes, defended its use of lethal force against individual members or suspected associates of al-Qa’ida and groups affiliated with it. In regards to human rights, the argued low threshold for discrimination in drone strikes, has resulted in a significant number of civilians being killed. Increasingly, the lack of transparency surrounding the use of armed drones has many people concerned. Amongst some policymakers and scholars, the threat of setting poor international norms for the use of armed drones in the midst of rising drone proliferation, is quite disconcerting. Aside from unproductive “black and white” arguments surrounding armed drone policy, there has been little in the way of realistic policy recommendations.

More useful have been recommendations that acknowledge the utility of drones as a part of a larger counterterrorism strategy. Recommendations which seek to find a balance between existing policies and efforts to tailor methods of targeting and increase the transparency of armed drone use have been most appropriate. However, there has not been an open discussion about changing the framework around which the U.S. uses armed drones to-date. This paper argues that the U.S. should define and use armed drones, within the scope of counterterrorism, as a method of deterring individual terrorists, rather than simply as a method to disrupt terrorist organizations.

In utilizing deterrence vis-à-vis drone strikes, a distinct “red line” is established for anyone who decides to plan an attack or aid in an attempted attack on the U.S. “If you plan to attack the U.S., you will become the target of an armed drone strike.” This simple framework has the ability to significantly reduce domestic and international controversy by getting away from the policy of “mowing” the proverbial “lawn of terrorists.”4 It not only makes for a more compelling legal justification, but also through the imposition of stricter targeting guidelines, in theory, it should decrease the number of civilian casualties attributable to drone strikes. Moreover, it stays within the confines of broader U.S. counterterrorism policies, as well as, being cost effective and sustainable.

This paper first covers what drones are and discusses the history of the their use in the ongoing “drone campaign.” Next, the paper talks more in depth about how specifically armed drones have been used and why they are such a valuable counterterrorism tool. The paper then discusses the various strategies for deterring terrorism and introduces a new framework for deterring terrorism with armed drones.

THE DRONE CAMPAIGN

WHAT ARE DRONES?

So far, this paper has mentioned “drones,” but it has not defined what exactly a drone is. Unarmed drones are generally called unmanned aerial vehicles (UAVs) while armed drones are frequently called unmanned combat aerial vehicles (UCAVs). The military, aside from calling its armed drones “unmanned combat aerial vehicles,” will sometimes refers to drones, generally, as “remotely piloted aerial systems.”5 Confusion has arisen as a result of interchanging terminology in reference to armed and unarmed drones, but as Matthews notes, “…“drone” has come to refer to unmanned combat aerial vehicles (UCAVs), which are UAVs equipped with combat capabilities, most commonly the ability to launch missiles.”6 However, wishing to avoid confusion, armed drones will simply be referred to as “drones” in this paper despite the existence of more nuanced nomenclature.

The U.S. armed drone fleet is made up of General Atomics MQ-1B Predator and General Atomics MQ-9 Reaper drones. The General Atomics MQ-1B Predator, or Predator drone, is the most famous drone in the U.S. fleet.7 Before receiving a block designation (the ‘B’ in MQ-1B), the Predator first saw combat as an unarmed reconnaissance asset in Bosnia back in 1995.8 The Predator drone however, was retrofitted with Hellfire missiles by 2001 and deployed to Afghanistan following the 9/11 attacks.9 With regards to mission, the MQ-1B Predator is used for “medium-altitude, long endurance” mission sets, and is capable of providing “intelligence gathering” and “munitions capability.”10

The General Atomics MQ-9 Reaper, or Reaper drone, is as Matthews describes, “a larger UCAV capable of carrying a higher payload.”11 Further distinguishing itself from the Predator, the mission of the Reaper is almost entirely hunting and killing, while it maintains a tertiary mission of intelligence collection “against high value, fleeting, and time sensitive targets.”12 Joining the Predator drone in 2007, the Reaper is operated exclusively by the Central Intelligence Agency (CIA) and the Joint Special Operations Command.13 Both the Predator and Reaper are currently being used in the drone campaign against al-Qa’ida and its affiliates.

HISTORY OF THE DRONE CAMPAIGN

The U.S. “drone campaign” which targets al-Qa’ida and its affiliates, began on February 4, 2002 when the CIA carried out its first drone strike.14 Targeting whom they believed to be al-Qa’ida fighters, and possibly Usama bin Ladin, the go-ahead was given for a strike on a known mujahideen base named Zhawar Kili in the Paktika province of Afghanistan.15 Having flown drones over Afghanistan since 2000, and armed drones in the aftermath of 9/11 in the support of military operations, the targeted killing of the three suspected al-Qa’ida members redefined the CIA’s boundaries.16 Prior to the drone strike, there had been heated discussions over the legality of the CIA using drones to directly target individuals. The discussions stemmed from a law passed in 1976 by President Ford’s signing of Executive Order 11905, which among other things, barred the CIA from carrying out assassinations.17 Weathering the minor criticism over the strike, the CIA soon expanded its new targeted killing campaign beyond Afghanistan.

On November 3, 2002, a hellfire missile struck a vehicle carrying six members of al-Qa’ida in Yemen.18 Among the dead was, Ali Qaed Sinan al-Harthi, believed to be a close associate of Usama bin Ladin, as well as the mastermind behind the bombing of the U.S.S. Cole in 2000.19 Despite having no precedent outside of Afghanistan, there was almost no mention of the incident in the media, and being in the recent wake of September 11, 2001 terrorist attack on the U.S. homeland, there was no domestic controversy. This is largely due to the fact that, at the time, there was little indication that there would be any sort of escalation or sustained campaign involving drones outside of the theaters of war.20 Aside from a few hardcore proponents, most of the CIA’s senior leadership did not think there was much utility for armed drones. They were mostly viewed as “blunt” and “unsophisticated.”21 As such, the prevailing counterterrorism strategy involved the use of clandestine special operations forces and covert intelligence operatives.22 Indeed, the drone strike which killed Harthi was the last strike outside of a war zone for over a year.

After a lengthy negotiation between high ranking U.S. officials and the Pakistani government over U.S. use of Pakistani airspace, a deal was reached in June of 2004.23 The deal opened up Pakistani airspace for the U.S. in return for the targeting and killing of Nek Muhammad, a Pakistani citizen who had ties to the Taliban and was an enemy of the Pakistani state.24 On June 18, 2004, Muhammad was killed and the U.S. drone campaign henceforth began targeting al-Qa’ida and Taliban leaders in the remote tribal areas of Pakistan.25 Over the next several years, the areas approved by the Pakistani government for the U.S. drone campaign, swaths of territory in Pakistian’s Federally Administered Tribal Areas, became a variable shooting range for the CIA.26

Feeling comfortable with its then nine year old drone campaign, and likely working with actionable intelligence obtained from the bin Laidin raid, the U.S. once again began using armed drones in Yemen.27 The U.S. had been striking targets inside of Yemen with Tomahawk cruise missiles since the middle of 2009, but the drone strike on May 5, 2011 was the first of its kind since 2002.28 Killed in the strike, Musaed Mubarak Aldaghery and Abdullah Mubarak Aldaghery, were brothers and operational leaders of al-Qa’ida in the Arabian Peninsula (AQAP).29 The growing belief that AQAP was a growing threat to the U.S. gave impetus for the continuation of the drone campaign in Yemen.30

So what has been the impact of the eleven year drone campaign? The Long War Journal, which tracks the drone campaign, has compiled statistical data about drone strikes into a publically accessible database. According to their data, as of the writing of this paper, there have been 338 drone strikes killing 2,507 suspected militants and 153 civilians in Pakistan since 2004.31 In Yemen, there have been 68 drone strikes resulting in the death of 333 suspected militants and the death of 82 civilians since 2002.32 Drone strikes have also occurred in Somalia and Libya, as well as the battlefields of Iraq and Afghanistan.33 However, the Long War Journal does not track strikes in those countries, and reliable data is not available elsewhere. That said, this fact is inconsequential as the numbers from Pakistan and Yemen are only used in this paper to demonstrate that the drone campaign is very active, and has continued to increase in scope and intensity over the past years.34 Today, the U.S. has busy drone bases being hosted by Pakistan, Yemen, Djibouti, Ethiopia, and the Seychelles, among other countries.35 Across theses bases, the U.S. has expanded its drone fleet from 50 in 2001 to some 7,500 drones by April 2012.36 Thus, given the heavy reliance on drones and drone strikes as a part of U.S. counterterrorism policy, it is worthwhile to look at how specifically the U.S. uses drones and answer why they are important.

HOW HAVE DRONES BEEN USED AND WHY ARE THEY IMPORTANT?

Throughout the drone campaign, the U.S. has used two methods of targeting. The first method is personality targeting. Drone strikes under this method, known as “personality strikes,” target a specific individual.37 The second method is signature targeting. Under signature targeting, “signature strikes” are carried out against “individuals whose identities are unknown, but who exhibit certain patterns of behavior or defining characteristics associated with terrorist activity.”38 Striking targets has been made more effective due to the unique attributes which drones bring to the table.

Within the boundaries of the drone campaign, drones successfully provide persistent surveillance and instantaneous responsiveness.39 Persistent surveillance is achieved through the ‘round-the-clock coverage of a target or target area. In other words, overlapping drone coverage can provide real time surveillance 24 hours a day, 7 days a week, 365 days a year if required. This is possible because the Predator and Reaper drones “can remain aloft, fully loaded with munitions, for over fourteen hours.”40 Prior to the widespread use of drones, manned aircraft surveillance was limited to a handful of hours at a time. For example, the F-16 fighter jet and A-10 ground attack aircraft can only linger over a target for about 4 hours.41

The instantaneous responsiveness, or more accurately put, the “on-demand” nature of drones, allows for split second decision making. Real time responsiveness gives drone pilots the flexibility to wait until the opportune moment to release missiles and munitions. It also allows the pilot to divert launched missiles at the last second in the event that the conditions on the ground become unfavorable for a strike.42 Though cruise missiles, and more so, intercontinental ballistic missiles (ICBMs) can reach their targets quickly, they pale in comparison to the few second flight times of Hellfire missiles fired from drones.43 Additionally, there is not a risk of misattribution associated with missiles fired from drones as there is with ICBMs, for example.44

The unmanned nature of drones is also important. Aside from being able to linger longer than manned aircraft, the unmanned nature of drones also eliminates the risk of injury, capture, or death to pilots in hostile areas.45 Moreover, drones are exceedingly inexpensive in terms of cost-to-own and cost-to-operate. For example, the flyaway cost of a new Reaper drone is $16.9 million for 2013, whereas the flyaway cost of a new F-35 is $153.1 million for 2013.46 Combined with a drone’s ability to provide persistent surveillance and instantaneous responsiveness, the platform is unrivaled and ideal for permissive environments. As the then director of the CIA, Leon Panetta, put it, drones are the “only game in town in terms of confronting or trying to disrupt the al-Qaeda leadership.”47 Further emphasizing the importance of drones to U.S. counterterrorism policy, twenty-two of the thirty al-Qa’ida leaders actively targeted by the U.S. have been killed.48 All with the exception of Usama bin Ladin were killed by drone strikes.49 Even with the benefits of drone use seemingly weighing in the favor of the drone campaign, there has been no shortage of controversy.

WHY IS THE DRONE CAMPAIGN CONTROVERSIAL?

The drone campaign has been controversial for several reasons. These reasons include: the legality of drone strikes, potential human rights violations, lack of transparency surrounding the campaign, potentially negative norm setting affects in the midst of proliferation, and declining international opinion surrounding the use of drones. The legal justification that the Obama administration points to when defending its use of drone strikes, mostly signature strikes, depends on the domain. Domestically, the Obama administration points to the Use of Military Force joint resolution passed by Congress following the 9/11 attacks. It states that the President is:

“…authorized to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons.”50

When justifying the drone campaign internationally, several arguments emerge. According to Zenko, ”international legal justifications for U.S. drone strikes…stem from the assertion that the United States is in a continuous state of international armed conflict with al-Qaeda and associated forces.”51 Moreover, “As a result, the laws of armed conflict (or international humanitarian law) apply, including necessity, proportionality, distinction, and humanity.”52 With regards to the International Covenant on Civil and Political Rights, which guarantees, among other things, the right to life, the Obama administration states that the United Nations (UN) adopted treaty is only applicable to persons within the U.S.53 Issues involving the violation of sovereignty are justified by Chapter VII, Article 51 in the Charter of the U.N. which reads:

“Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by Members in the exercise of this right of self-defence shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.”54

According to the Obama administration, it is merely exercising its right to self-defense through the use of targeted killings when a “targeted country is unable or unwilling to counter imminent and significant threats.”55

Even with its legal justifications in hand, potential issues with the Obama administration’s arguments still remain. Particularly in terms of signature strikes. As Heller, a legal scholar and associate professor at the Law School of Melbourne University, states, “Even if a U.S. signature strike can be considered a necessary proportionate response to an armed attack” it does not “mean that the use of deadly force against an individual was legal.”56 He continues to explain that “extra-territorial targeted killing potentially violates two different…rights under international law.”57 To include ”the right of the affected state to territorial sovereignty, as protected under Article 24 of the U.N. Charter” and ”the targeted individual’s right to life, as protected under Article 6 of the International Covenant on Civil and Political Rights (ICCPR).”58 Lastly, the issue of sovereignty aside, Heller argues that the burden is on the Obama administration to prove that it is not denying an individual’s right to life when carrying out targeted killings.59

Related to the issue surrounding individual right to life, the number of civilian deaths associated with the drone campaign has led some to assert that the U.S. is violating human rights. Along with this, opinions of the U.S. drone campaign have dropped substantially. Not surprisingly, there are now widespread reports that civilian deaths “have angered local populations and created tensions in the United States’ relationship” with its host states.”60

The exact numbers of civilian deaths and casualties remains difficult to pin-down. However, according to the estimates of the Long War Journal, there have been over two-hundred civilian deaths over the course of the drone campaign.61 While the number of signature strikes versus personality strikes is unknown, many associate the “lower bar” for signature strikes as the key contributor to civilian deaths. Opinion matters because “the United States cannot conduct drone strikes in the most critical corners of the world by itself,” indeed, “strikes require the tacit or overt support of host states or neighbors.”62 Additionally, poor targeting strategies effect the required intelligence.

In the U.S., the issue of transparency has also become a hot button topic surrounding the drone campaign. Zenko accurately highlights that in “the United States, the public and policymakers are increasingly uneasy with limited transparency for targeted killings.”63 Not knowing how individuals or groups of individuals are targeted, under signature strikes in particular, has been at the root. Moreover, the lack of openness involving decision making within the drone campaign has been disconcerting. Lastly, the Obama administration has not provided answers and remains largely dismissive of growing public concern.

Norm setting and the issue of growing drone proliferation are also points of debate with regards to the drone campaign. The U.S. will cease to hold a near-monopoly on drone use in the coming years.64 As such, how the U.S. uses drones, or as some claim, misuses drones, in an offensive capacity, will set the stage for what is deemed acceptable for states like China. Indeed, “U.S. policy provides a powerful precedent for other states and nonstate actors that will increasingly deploy drones with potentially dangerous ramifications.”65

STRATEGIES FOR DETERRING TERRORISM

WHAT IS DETERRENCE?

According to Kroenig, deterrence “is a strategic interaction in which an actor prevents an adversary from taking an action that the adversary otherwise would have taken by convincing the adversary that the cost of taking that action will outweigh any potential gains.”66 Put differently, deterrence exacts costs for certain actions or reduces the expected benefit of an action.67 Crenshaw adds that “effective deterrence has three minimum requirements. The defender needs to know the challenger’s values, how to credibly threaten those values, and how the threat will be received and acted on.”68 Deterrence strategies can either be direct or indirect.

INDIRECT DETERRENCE

Indirect deterrence is “intended to pressure third parties who facilitate terrorism rather than terrorist operatives themselves.”69 The idea is that terrorists rely on third parties in order to operate, and through the threat of punishment, third parties, now at risk, will cease to cooperate with a terrorist organization. Thus, preventing the terrorist organization “from obtaining the resources they need” in order to operate.70 Third parties could include financiers, direct state sponsors, host states, criminal entities, or affiliated groups that work with the targeted organization.

A second form of indirect deterrence is “triadic deterrence” which involves “state/host-state/insurgent triads.”71 Triadic deterrence occurs when “one state uses punishments and/or threats against another state to deter it from supporting a non-state actor, if not to compel it to stop assisting it.”72 However it is important to note that the triadic deterrence relationship can only work when the host state has the ability to act as a “central authority.”73 Atzili and Pearlman state that in “weak and divided governmental structures, competing domestic interests trump raison d’etat. Attempted deterrence thus does not have the intended results, regardless of the military power it projects.”74

DIRECT DETERRENCE

There are two forms of direct deterrence. The first is deterrence by denial “which contribute[s] to deterrence by threatening to deny an adversary the benefits of a particular course of action.”75 While strategies which exact costs “threaten retaliation,benefit denial strategies threaten failure.”76 Therefore, if an adversary is led to believe that there is a low probability of success for a particular action, they might be able to be deterred from taking it.77 It is also important to note that strategies of denial are inherently more credible than retaliatory threats due to the fact that they involve action and not the threat thereof.78

Deterrence by denial exists at three levels: tactical, operational, and strategic. Tactical involves efforts which seek “to improve homeland defenses and increase operational risk” as well as increasing the probability that an attack will be unsuccessful for potential terrorists.79 Knopf points out that terrorists “may be willing to risk or give their lives, but not in futile attacks.”80 At the operational level, the goal is to deny terrorists the capability of carrying out an attack by “restricting access to resources terrorist require to conduct an ongoing campaign of attacks.”81 Lastly, strategic deterrence by denial denies would-be terrorists their end goals.82 Methods of societal bolstering and resiliency tactics fall under this level. Knopf highlights that when “a society can demonstrate the ability to withstand terrorism, it sends a message that using this tactic will not enable terrorist organizations to achieve their goals.”83

The second form of direct deterrence is deterrence by punishment. Most applicable to the drone campaign, deterrence by punishment, as Kroenig and Pavel put it, “seek[s] to achieve deterrence by threatening to impose unacceptable costs on an adversary if the adversary takes a particular course of action.”84 Moreover, deterrence by punishment, also known as deterrence by retaliation, “involves a threat from the defender to do something new, not to continue a course of action.”85

MIXED METHODS OF DETERRENCE

Mixed methods of deterrence include deterrence by delegitimization and cumulative deterrence. Deterrence by delegitimization combines deterrence by denial and deterrence by punishment by “deny[ing] a terrorist organization the benefit of gaining approval and support while also imposing the punitive cost of increased criticism and loss of support.”86 Also involving both deterrence by denial and deterrence by punishment, cumulative deterrence is “based on a gradual wearing down of the adversary through offensive and defensive measures as well as positive inducements.”87

POTENTIAL SHORTCOMINGS OF DETERRING TERRORISM

Given the nature of deterring terrorism and the difficulty associated with defining success in relationships involving deterrence, scholars in the fourth wave of deterrence research have been quite skeptical. Stein, perhaps more optimistic than some, states that deterring terrorism “is exceedingly difficult in practice, but not impossible in theory.”88 A common critique is that it is not possible to deter someone who is willing to die.89 This of course assumes that there are not other things, life aside, that a suicide terrorist values. Also common is the argument that a terrorists do not have return addresses. Atzili and Perman note that “non-state actors are well-positioned to withstand conventional retaliation due to their small size, secretive structures, and the lack of “return address” against which the actors that deter can retaliate.”90 Perhaps the best critique involves the complexity of deterring terrorism. Wenger’s observation that “designing, communicating, and understanding” threats for terrorists is inherently more difficult than when similarly applied to state-to-state relationships, is accurate.91 Particularly when speaking about al-Qa’ida, the organization’s leadership “diffusion passively degrades a state’s ability to properly communicate threats and apply coercion, thereby invalidating deterrent/compellent strategies.”92 The incompatibility of deterrence and the aims of eradicating al-Qa’ida are also called into question in terms of deterrence. As Knopf astutely points out, “The U.S. intention to go after al Qaeda whether or not al Qaeda launches further attacks means there can be no U.S. promise to let the organization survive if it refrains from future terrorism.”93

DETERRENCE IS STILL USEFUL WHEN APPLIED TO TERRORISM

Deterrence is still useful when applied to terrorism, but only when the goals of the method of deterrence wishing to be achieved are realistic. Deterring all terrorists is not possible, however, deterring some very well might be.94 The focus should be on achieving results at the margins.95 Asking for too much from deterrence is a recipe for disaster. As Wenger illustrates, “deterrence cannot be the focal point for counterterrorism. Deterrence is only one element of a broader influence strategy and therefore cannot serve as the overarching strategy for managing the relationship between states and terrorists.”96

DETERRENCE AND COUNTERTERRORISM POLICY

The Bush administration feeling that the U.S. had become soft, particularly in its response to terrorism, saw deterrence as something that should be included in U.S. policy, but not something that should be relied upon.97 The Bush administration saw deterrence as having a poor track record and often opted for preemptive measures to mitigate threats to the U.S.98 That said, the official policy put forth, dubbed “tailored deterrence,” sought “to enable the United States to craft different deterrent options to address different adversaries and situations.”99 Following 9/11, the administration, despite not relying on deterrence, took a strong deterrent approach.100 In terms of deterring al-Qa’ida’s supporters, the Bush administration made it quite clear that anyone harbouring terrorists would be held accountable. This indirect approach served the purpose of punishing those associated with al-Qa’ida while denying al-Qa’ida the resources it needed to operate. When dealing with al-Qa’ida directly, the Bush administration took a deterrence by denial approach. The administration, “mostly focused on measures that would improve tactical deterrence - aiming to convince terrorists that particular attacks will not succeed.”101

The Obama administration, similar to the Bush administration, has not relied on deterrence. As was evidenced in the background of the drone campaign, the Obama administration has heavily relied on disrupting al-Qa’ida opposed to deterring it. Indeed, the words deter, deterrent, and deterring only appear three times in the National Strategy For Counterterrorism.102 The U.S.’s more holistic security strategy, outlined in the White House’s National Security Strategy document, only uses the words seventeen times and in vague overarching statements mostly referring to state-to-state relationships involving weapons of mass destruction.103 It seems as if the fact that deterrence is not easily “compatible with killing, capturing, and defeating,” as Crenshaw points out, has left deterrence by the wayside.104 The Obama administration’s current “3-D” approach to counterterrorism, disrupting, dismantling, and defeating (al-Qa’ida), does not include deterrence.105

DETERRING TERRORISM USING ARMED DRONES

A NEW FRAMEWORK

When looking at the various ways that the drone campaign could achieve a deterrent effect, direct methods, specifically deterrence by punishment, is the only plausible solution. Indirect methods are not particularly useful in terms of the drone campaign. Given the fact that this form of deterrence deals with those on the periphery of violence, not those whom are directly responsible for acts of violence, drone strikes would not be a proportional response for third-parties. Striking third-parties would almost certainly exacerbate the already controversial nature of the drone campaign. As discussed when defining triadic deterrence, deterring states into taking action against terrorist organizations can only have positive results when the state has “central authority” and does not have competing political stakeholders.106 Given that al-Qa’ida has set up shop in weak states like Pakistan and Yemen, triadic deterrence would only serve to further weaken the already fragile governments. Deterrence by denial is not applicable to the drone campaign either. Its mere essence involves the threat of failure whereas deterrence by denial, for example, threatens retaliation.107 Therefore, the drone campaign, which currently is used to disrupt terrorist organizations, should be converted into a deterrence by punishment strategy against individual terrorists.

In transitioning to this new framework, the U.S. first needs to discontinue its use of signature strikes. By not targeting individuals for clear violations of a preestablished red line, not only is the signaling process damaged, but the requisite assurances for deterrence to work are not present.108 Additionally, signature strikes, as can be viewed as an extension of preemption doctrine, would only serve to “undercut American deterrent efforts.”109 As such, the red line should be established before those who have previously committed and/or aided in the commission of an act of terrorism on the U.S.; or are actively plotting, aiding in the commission of, or are in the process of carrying out an act of terrorism on the U.S. Any individual short of that threshold should not be targeted. For clarity and justifiability, the red line would have to be more detailed and define things like what is considered terrorism, what constitutes plotting, and what activities are considered to be aiding in the commission of terrorism, but those answers are beyond the scope of this paper.

ELIMINATING CONTROVERSY

As was highlighted earlier in the paper, there is a great deal of controversy surrounding the drone campaign. The controversy surrounding the legality of drone strikes stems almost entirely from the use of signature strikes. By eliminating signature strikes alone, the new framework sits on a much better legal foundation, even if the Obama administration ignores other areas of reform for the drone program. Legal justifications are further improved through the inclusion of the proposed red line. The relationship between “deterrence and right to self-defense” has long been a legitimate norm within the international community. As a result, questions over an individual’s “right to life” or “state sovereignty” would virtually disappear if the drone campaign operates under the proposed red line.

Presumably, the restricting of the drone campaign to personality strikes and the further restricting threshold for drone strikes would reduce civilian casualties. While allegations of human rights violations are always going to be present when a state uses violence, the justifiability of strikes under the proposed framework should greatly reduce such allegations. Moreover, international opinion over the use of drones, while currently damaged, could eventually improve with fewer civilian deaths and casualties.110

Related to opinions about the drone campaign, concerns over transparency could be greatly reduced with the new framework. Particularly if the Obama administration openly embraces this new framework. Ideally, the Obama administration would publish its list of people being targeted by the drone campaign, but that may not always be possible due to national security interests. Alternatively, in the future, as long as the U.S. names the intended targets of strikes and briefly notes how the individuals meet the threshold for a strike, fears over the misuse of drones can be alleviated. Lastly, the bolstered legal foundation and transparency offered under this framework would go a long way towards establishing a responsible use precedent for the international community. Norms are becoming increasingly important with drone proliferation. Thus, with the erection of new norms by the U.S., the concern over other states treading down a less desirable path can be diminished.

JUSTIFICATIONS FOR THE NEW FRAMEWORK

Aside from offering a way to reduce or eliminate controversy surrounding the drone campaign, the new framework is also consistent with the existing counterterrorism policy trajectory. Given the tightening of criteria for drone strikes, it may be offered that the new framework is taking a softer approach to al-Qa’ida. This however, is not the case. Those who have been involved in previous attacks on the U.S. are not given amnesty, rather, they are grandfathered into the list of targetable individuals because they have previously crossed the threshold. Moreover, concerns over a deviation from the current policy of disrupting al-Qa’ida through leadership decapitation are unwarranted. One would be hard pressed to find a senior al-Qa’ida leader that has not previously been involved in an act of terrorism against the U.S. Therefore, barring some extreme example where an individual al-Qa’ida leader slips through a hypothetical crack in the proposed framework, that aspect of the drone campaign remains business as usual.

Critics might also point to the problems associated with deterring terrorists, such as the fact that you cannot deter those that are willing to die. However, not all terrorists are undeterrable. Indeed, deterrence which relies on retaliatory threats could be quite “effective against those actors in a terrorist network who value their lives and property, such as leaders, financiers, and clerics.”111 For those that are not deterrable, and do cross the line, targeting those individuals with drone strikes is probably the best option for the U.S.

With regards to the contradiction of seeking al-Qa’ida’s defeat and targeted drone strikes, the new framework also addresses this. While the disrupting, dismantling, and ultimately, the defeat of al-Qa’ida remain the core objectives, death is only prescribed to those that have sought to attack, attacked, or are in the process of attacking the U.S. Given the need for assurance in deterrence, no member of al-Qa’ida will be targeted for death that does not meet the threshold. Foot soldiers that are low in the food chain are largely left alone, assuming no history of terrorism or ongoing plots against the U.S., under the new framework. That has the added benefit of shoring up resources for higher value targets. The foot soldiers do not get a pass however, and just because members of al-Qa’ida do not meet the threshold for lethal targeting, other non-lethal counterterrorism options such as: arrest and imprisonment, asset seizure, and travel restriction remain on the table. As the National Strategy For Counterterrorism states, “certain tactical successes can have unintended consequences that sometimes contribute to costs at the strategic level.”112 This fact can be mitigated through the inclusion of a deterrence strategy.

CONCLUSION

Ultimately, the new framework can continue giving the U.S. tactical successes while more closely aligning with U.S. strategic goals. Meanwhile, the framework will reduce controversy for the drone campaign which has been instrumental in our pursuit of al-Qa’ida to-date. The sustainable nature of the framework is also key. Being cost effective, efficient, and legally sound, it affords U.S. counterterrorism officials a long-term tool in what is promising to be a drawn out battle against al-Qa’ida.

That said, it is important to remember that deterrence is not perfect. The degree to which the prescribed framework will be effective may not be easily measured. Given that it is difficult to know how exactly threats are received by al-Qa’ida’s leadership, signaling may be an issue.113 It is also prudent to remember that there are no silver bullets for counterterrorism policy, and all policies are subject to failures and shortcomings. Consequently, though the framework will not be perfect, that does not mean that it is not the best way to pursue the drone campaign in the future. Indeed, the goal of the new framework is simply to create a sustainable path for the drone campaign while finding deterrent success at the margin. The new framework when coupled with deterrence by denial efforts creates a layered approach that, among other counterterrorism tools, becomes a new, more holistic approach to combating al-Qa’ida.

This paper does not cover the use of armed drones against U.S. citizens, use of drones inside the territorial confines of the U.S., or issues related to the morality of drone strikes. These issues are however important, and should be included in future discussion of drone policy.

NOTES

  1. “National Strategy For Counterterrorism,” The White House, June 2011, accessed May 10, 2013, http://www.whitehouse.gov/sites/default/files/counterterrorism_strategy.pdf.

  2. Bryan C. Price, “Leadership Decapitation and the End of Terrorist Groups,” Belfer Center, Harvard, May 2012, accessed May 10, 2013, http://belfercenter.ksg.harvard.edu/publication/22121/leadership_decapitation_and_the_end_of_terrorist_groups.html.

  3. Micah Zenko, “Reforming U.S. Drone Strike Policies,” Council On Foreign Relations, Council Special Report Number 65, January 2013, accessed May 10, 2013, http://i.cfr.org/content/publications/attachments/Drones_CSR65.pdf.

  4. Dennis Kucinich, “Obama administration must account to Congress for targeted assassinations,” The Guardian, November 16, 2012, accessed May 10, 2013, http://www.guardian.co.uk/commentisfree/2012/nov/16/obama-administration-account-congress-targeted-assassinations.

  5. “Drones: What are they and how do they work?,” BBC, January 31, 2012, accessed May 10, 2013, http://www.bbc.co.uk/news/world-south-asia-10713898.

  6. Dylan Matthews, “Everything you need to know about the drone debate, in one FAQ,” Washington Post, March 8, 2013, accessed May 10, 2013, http://www.washingtonpost.com/blogs/wonkblog/wp/2013/03/08/everything-you-need-to-know-about-the-drone-debate-in-one-faq/.

  7. Ibid.

  8. Ibid.

  9. Ibid.

  10. Josh Leves, “CNN Explains, U.S. drones,” CNN, February 8, 2013, accessed May 10, 2013, http://www.cnn.com/2013/02/07/politics/drones-cnn-explains.

  11. Dylan Matthews, “Everything you need to know about the drone debate, in one FAQ.”

  12. Josh Leves, “CNN Explains, U.S. drones.”

  13. Dylan Matthews, “Everything you need to know about the drone debate, in one FAQ.”

  14. John Sifton, “A Brief History of Drones,” The Nation, February 7, 2012, accessed May 10, 2013, http://www.thenation.com/article/166124/brief-history-drones.

  15. Ibid.

  16. Ibid.

  17. “President Gerald R. Ford’s Executive Order 11905: United States Foreign Intelligence Activities,” FAS, accessed May 10, 2013, http://www.fas.org/irp/offdocs/eo11905.htm.

  18. Tony Karon, “Yemen Strike Opens New Chapter in War on Terror,” Time, November 5, 2002, accessed May 10, 2013, http://www.time.com/time/world/article/0,8599,387571,00.html.

  19. Ibid.

  20. Ibid.

  21. Mark Mazzetti, “A Secret Deal on Drones, Sealed in Blood,” The New York Times, April 6, 2013, accessed April 19, 2013, http://www.nytimes.com/2013/04/07/world/asia/origins-of-cias-not-so-secret-drone-war-in-pakistan.html.

  22. Tony Karon, “Yemen Strike Opens New Chapter in War on Terror;” and “Sources: U.S. kills Cole suspect,” CNN, November 5, 2002, accessed May 10, 2013, http://archives.cnn.com/2002/WORLD/meast/11/04/yemen.blast/.

  23. Mark Mazzetti, “A Secret Deal on Drones, Sealed in Blood.”

  24. Ibid.

  25. David Rohde and Mohammed Khan, “Ex-Fighter for Taliban Dies in Srike in Pakistan,” The New York Times, June 19, 20014, accessed May 10, 2013, http://www.nytimes.com/2004/06/19/international/asia/19STAN.html; and Bill Roggio and Alexander Mayer, “Charting the data for US airstrikes in Pakistan, 2004 - 2013,” The Long War Journal, last modified April 17, 2013, accessed May 10, 2013, http://www.longwarjournal.org/pakistan-strikes.php.

  26. Mark Mazzetti, “A Secret Deal on Drones, Sealed in Blood.”

  27. Spencer Ackerman, “First Drone Strikes Since bin Laden Raid Hit Pakistan, Yemen,” Wired, Danger Room, May 6, 2011, accessed May 10, 2013, http://www.wired.com/dangerroom/2011/05/first-drone-strikes-since-bin-laden-raid-hit-pakistan-yemen/.

  28. Jeb Boone and Greb Miller, “U.S. drone strike in Yemen is first since 2002,” Washington Post, May 5, 2011, accessed May 10, 2013, http://www.washingtonpost.com/world/middle-east/yemeni_official_us_drone_strike_kills_2_al_qaeda_operatives/2011/05/05/AF7HrzxF_story.html.

  29. Jeb Boone and Greb Miller, “U.S. drone strike in Yemen is first since 2002;” and Spencer Ackerman, “First Drone Strikes Since bin Laden Raid Hit Pakistan, Yemen.”

  30. Ibid.

  31. Alexander Mayer, “Charting the data for US airstrikes in Pakistan, 2004 - 2013.”

  32. Bill Roggio and Bob Barry, “Charting the data for US air strikes in Yemen, 2002 - 2013,” The Long War Journal, last modified May 18, 2013, accessed May 18, 2013, http://www.longwarjournal.org/multimedia/Yemen/code/Yemen-strike.php.

  33. Craig Whitlock and Greg Miller, “U.S. assembling secret drone bases in Africa, Arabian Peninsula, officials say,” Washington Post, September 20, 2011, accessed May 10, 2013, http://articles.washingtonpost.com/2011-09-20/world/35273162_1_undeclared-drone-wars-seychelles-president-james-michel-unmanned-aircraft.

  34. Alexander Mayer, “Charting the data for US airstrikes in Pakistan, 2004 - 2013;” and Bill Roggio and Bob Barry, “Charting the data for US air strikes in Yemen, 2002 - 2013.”

  35. 107th Congress, “Authorization for Use of Military Force,” September 18, 2001, accessed May 10, 2013, http://www.gpo.gov/fdsys/pkg/PLAW-107publ40/html/PLAW-107publ40.htm.

  36. Micah Zenko, “Reforming U.S. Drone Strike Policies.”

  37. Peggy McInerny, “U.S. drone signature strikes: An often illegal “killing machine,” International Institute, UCLA, April 9, 2013, accessed May 10, 2013, http://www.international.ucla.edu/burkle/news/article.asp?parentid=131351.

  38. Ibid.

  39. Micah Zenko, “Reforming U.S. Drone Strike Policies.”

  40. Ibid.

  41. Ibid.

  42. Ibid.

  43. Ibid.

  44. Ibid.

  45. Ibid.

  46. “Department of Defense Fiscal Year (FY) 2013 President’s Budget Submission,” Department of the Air Force, February 2012, accessed May 10, 2013, http://www.saffm.hq.af.mil/shared/media/document/AFD-120210-115.pdf.

  47. Micah Zenko, “Reforming U.S. Drone Strike Policies.”

  48. Ibid.

  49. Ibid.

  50. 107th Congress, “Authorization for Use of Military Force.”

  51. Micah Zenko, “Reforming U.S. Drone Strike Policies.”

  52. Ibid.

  53. Ibid.

  54. “Chapter VII: Action With Respect To Threats To The Peace, Breaches of The Peace, And Acts of Agression,” Charter Of The United Nations, accessed May 10, 2013, www.un.org/en/documents/charter/chapter7.shtml.

  55. Micah Zenko, “Reforming U.S. Drone Strike Policies.”

  56. Peggy McInerny, “U.S. drone signature strikes: An often illegal “killing machine,”

  57. “U.N. Official Says U.S. Drones Breach Pakistan’s Sovereignty,” New York Times, March 15, 2013, accessed May 10, 2013, http://www.nytimes.com/2013/03/16/world/asia/un-official-denounces-us-drone-use-in-pakistan.html.

  58. Bill Roggio and Bob Barry, “Charting the data for US air strikes in Yemen, 2002 - 2013;” and Bill Roggio and Alexander Mayer, “Charting the data for US airstrikes in Pakistan, 2004 - 2013.”

  59. Micah Zenko, “Reforming U.S. Drone Strike Policies.”

  60. Ibid.

  61. Ibid.

  62. Ibid.

  63. Ibid.

  64. Ibid.

  65. Ibid.

  66. Matthew Kroenig and Barry Pavel, “How to Deter Terrorism,” Center for Strategic and International Studies, The Washington Quarterly, 35:2, Spring 2012, accessed May 10, 2013, http://csis.org/files/publication/TWQ_12Spring_Kroenig_Pavel.pdf.

  67. Andreas Wenger and Alex Wilner, “Deterring Terrorism: Moving Forward,” Deterring Terrorism: Theory and Practice, edited by Andreas Wenger and Alex Wilner, (Stanford: Stanford University Press, 2012), 301-324.

  68. Martha Crenshaw, “Will Threats Deter Nuclear Terrorism?,” Deterring Terrorism: Theory and Practice, edited by Andreas Wenger and Alex Wilner, (Stanford: Stanford University Press, 2012), 136-158.

  69. Jeffrey W. Knopf, “Terrorism And The Fourth Wave In Deterrence Research,” Deterring Terrorism: Theory and Practice, edited by Andreas Wenger and Alex Wilner, (Stanford: Stanford University Press, 2012), 21-45.

  70. Jeffrey W. Knopf, “Wrestling with Deterrence: Bush Administration Strategy After 9/11,” Contemporary Security Policy, 29:2, 229-265, September 10, 2008, accessed May 10, 2013, http://dx.doi.org/10.1080/13523260802284076.

  71. Boaz Atzili and Wendy Pearlman, “Triadic Deterrence: Coercing Strength, Beaten by Weakness,” Security Studies, 21:2, 301-335, May 22, 2012, accessed May 10, 2013, http://dx.doi.org/10.1080/09636412.2012.679209.

  72. Ibid.

  73. Ibid.

  74. Ibid.

  75. Matthew Kroenig and Barry Pavel, “How to Deter Terrorism.”

  76. Ibid.

  77. Ibid.

  78. Ibid.

  79. Jeffrey W. Knopf, “Terrorism And The Fourth Wave In Deterrence Research.”

  80. Ibid.

  81. Ibid.

  82. Ibid.

  83. Matthew Kroenig and Barry Pavel, “How to Deter Terrorism.”

  84. Martha Crenshaw, “Will Threats Deter Nuclear Terrorism?”

  85. Ibid.

  86. Jeffrey W. Knopf, “Terrorism And The Fourth Wave In Deterrence Research.”

  87. Martha Crenshaw, “Will Threats Deter Nuclear Terrorism?”

  88. Janice Gross Stein, “Deterring Terrorism, Not Terrorists,” Deterring Terrorism: Theory and Practice, edited by Andreas Wenger and Alex Wilner, (Stanford: Stanford University Press, 2012), 46-66.

  89. Ibid.

  90. Boaz Atzili and Wendy Pearlman, “Triadic Deterrence: Coercing Strength, Beaten by Weakness.”

  91. Andreas Wenger and Alex Wilner, “Deterring Terrorism: Moving Forward.”

  92. Frank Harvey and Alex Wilner, “The Practical Limits Of Coercing Terrorists,” Deterring Terrorism: Theory and Practice, edited by Andreas Wenger and Alex Wilner, (Stanford: Stanford University Press, 2012), 95-116.

  93. Jeffrey W. Knopf, “Terrorism And The Fourth Wave In Deterrence Research.”

  94. Frank Harvey and Alex Wilner, “The Practical Limits Of Coercing Terrorists,”

  95. Jeffrey W. Knopf, “Terrorism And The Fourth Wave In Deterrence Research.”

  96. Andreas Wenger and Alex Wilner, “Deterring Terrorism: Moving Forward.”

  97. Jeffrey W. Knopf, “Wrestling with Deterrence: Bush Administration Strategy After 9/11.”

  98. Ibid.

  99. Ibid.

  100. Ibid.

  101. Ibid.

  102. “National Strategy For Counterterrorism.”

  103. “National Security Strategy,” The White House, May 2010, accessed May 10, 2013, http://www.whitehouse.gov/sites/default/files/rss_viewer/national_security_strategy.pdf.

  104. Martha Crenshaw, “Will Threats Deter Nuclear Terrorism?”

  105. “National Strategy For Counterterrorism.”

  106. Boaz Atzili and Wendy Pearlman, “Triadic Deterrence: Coercing Strength, Beaten by Weakness.”

  107. Matthew Kroenig and Barry Pavel, “How to Deter Terrorism.”

  108. Thomas C. Schelling,”The Retarded Science of International Strategy,” The Strategy Of Conflict, (Massachusetts: Harvard, 1960), 3-20.

  109. Jeffrey W. Knopf, “Wrestling with Deterrence: Bush Administration Strategy After 9/11.”

  110. Micah Zenko, “Reforming U.S. Drone Strike Policies.”

  111. Matthew Kroenig and Barry Pavel, “How to Deter Terrorism.”

  112. “National Strategy For Counterterrorism.”

  113. Martha Crenshaw, “Will Threats Deter Nuclear Terrorism?”

Categories
Terrorism, Counterterrorism, Publications
Tags
Drone Strikes, Deterrence, Drones, Drone Campaign, Al-Qa'ida, Terrorism, Counterterrorism