recommended reading

Can we wage a just drone war?

An MQ-1 Predator un, ... ]

An MQ-1 Predator un, ... ] // Air Force

Drones have been an increasingly important fixture in foreign affairs, but not without controversy. Military and intelligence personnel, robotics experts, and some academic have argued they remove the risk to U.S. personnel. Moreover, their ability to undertake limited, pinprick, covert strikes significantly reduces civilian casualties compared to other weapons platforms, as well as the costs and risks of waging a larger war to curtail the terrorist threat, thus leading to what the Obama administration sees as a more humane type of war. Among the critics, some legal experts challenge the legality of CIA-controlled drones to undertake targeted killings across sovereign borders, while journalists and human rights organizations have brought to light concerns about the efficacy of CIA-drones in avoiding civilian casualties and the impact purported civilian deaths have on fueling terrorist recruitment. Finally, other scholars, myself included, have begun to examine the extent to which the lack of transparent decision making processes related to the never-so-secret CIA-led drone operations might lead to unjust uses of force or undermine democracy.
 
In response to this public debate, the Assistant to the President for Homeland Security and Counterterrorism, John Brennan, gave a speech in April 2012 officially recognizing, for the first time, the administration's use of drones to undertake targeted killings. Brennan defended them as legal under domestic and international law, ethical according to the standards of war, wise because they limit risk to U.S. personnel and foreign civilians, and subject to a complex and thorough review process. He identifies the advantages drones as helping the U.S. to satisfy the "principle of humanity", which "requires us to use weapons that will not inflict unnecessary suffering." The problem is that accepting drones as a default strategy to be used almost anywhere relegates other alternative to the backburner, and in turn, may undermine the prospects for a just peace in the long run. Indeed, Brennan's speech has done little to calm the waters, and the controversy surrounding drones remains rife.
 
Even though the threat posed by Al Qaeda must be recognized, as must the truth that U.S. leaders and officials face difficult dilemmas when thinking about whether to employ drones (or any use of force), important concerns remain regarding the standards described by Brennan. Notwithstanding possible objections that drones are, in fact, legal and wise, I want to focus here on the ethical and procedural justifications outlined in Brennan's speech, and raise two key questions: Are lethal drone strikes a last resort, that is to say, have all feasible alternatives really been exhausted? Can the use of drones lead to a lasting and just peace?

Read more at The Atlantic.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.