Skip to main content Accessibility help
×
Hostname: page-component-cd9895bd7-gvvz8 Total loading time: 0 Render date: 2024-12-26T14:05:12.951Z Has data issue: false hasContentIssue false

8 - Regulating Drones

Are Targeted Killings by Drones Outside Traditional Battlefields Legal?

Published online by Cambridge University Press:  05 December 2014

William C. Banks
Affiliation:
Syracuse University
Peter L. Bergen
Affiliation:
New America Foundation
Daniel Rothenberg
Affiliation:
Arizona State University
Get access

Summary

Law and Targeted Killings

Targeted killing is nasty business, however carried out. For the US government, the pace of targeted drone strikes has quickened dramatically in the early years of the Obama administration. If the use of sophisticated armed drone technology has become the contemporary weapon of choice for responding to terrorists and insurgents who wantonly cause civilian deaths, US policymakers, as well as society at large, have an obligation to see to it that the weapons and their use are subject to a tightly managed and accountable set of legal controls that are as transparent as possible.

After the George W. Bush administration deployed drones in the Afghanistan and Iraq wars and introduced cross-border strikes in Pakistan as an adjunct to the Afghan campaign, the Obama administration accelerated their use. Central to this process was the role of targeted killing as a key element of counterterrorism and counterinsurgency campaigns against al-Qaeda, the Taliban, and associated groups. As early as 2009, commenting on the use of drones for targeting killings in Pakistan, the former director of the CIA, Leon Panetta, said, “It’s the only game in town in terms of confronting or trying to disrupt the al Qaeda leadership.” Meanwhile, public support for the policy was strong. A January 2012 ABC NewsWashington Post poll found that 83 percent of Americans approved of the administration’s use of drones for targeted killing of terrorist suspects.

Type
Chapter
Information
Drone Wars
Transforming Conflict, Law, and Policy
, pp. 129 - 159
Publisher: Cambridge University Press
Print publication year: 2014

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Kessler, Glenn, “President Obama and the defense budget,” Washington Post, February 14, 2012
Schmitt, Eric, “U.S. teaming with new Yemen government on strategy to combat Al Qaeda,” New York Times, February 27, 2012.
Banks, William C., and Raven-Hansen, Peter, “Targeted killing and assassination: The U.S. legal framework,” University of Richmond Law Review 37 (2003): 667–749, p. 688.Google Scholar
Banks, William C., “The Predator” in Franke, Volker (ed.), Terrorism and peacekeeping: New security challenges (Westport, CT: Greenwood Press, 2004), pp. 142–157.Google Scholar
Shane, Scott, Mazzetti, Mark, and Worth, Robert F., “Secret assault on terrorism widens on two continents,” New York Times, August 14, 2010.
Miller, Greg, “Under Obama, an emerging global apparatus for drone killing, Washington Post, December 27, 2011.
Rhode, David, “The Obama doctrine: How Obama’s drone war is backfiring,” Foreign Policy, March/April 2012.
Bergen, Peter, and Tiedemann, Katherine, “Washington’s phantom war,” Foreign Affairs, July/August 2011.
Kamiya, Gary, “Hypnotized into an endless dirty war,” Salon, February 20, 2012.
Fishman, Brian, “Anwar al-Awlaki, the infidel,” Jihadica, November 20, 2009.
Finn, Peter, “Awlaki directed Christmas ‘underwear bomber’ plot, Justice Department memo says,” Washington Post, February 10, 2012.
Shane, Scott, “Judging a long, deadly reach,” New York Times, September 30, 2011.
Miller, Greg, and Finn, Peter, “CIA sees increased threat from al-Qaeda in Yemen,” Washington Post, August 24, 2010.
Finn, Peter, “Secret U.S. memo sanctioned killing of Aulaqi,” Washington Post, September 30, 2011.
Farrand, Max, (ed.) The records of the federal convention of 1787, vol. 2 (rev. ed. 1937), p. 318.
Gellman, Barton, “CIA weighs ‘targeted killing’ missions,” Washington Post, October 28, 2001.
DeYoung, Karen, “Secrecy defines Obama’s drone war,” Washington Post, December 19, 2011.
Johnston, David, and Sanger, David E., “Fatal strike in Yemen was based on rules set out by Bush,” New York Times, November 6, 2002, p. A16.
Priest, Dana, and Arkin, William M., Top secret America: The rise of the New American security state (New York, NY: Little, Brown and Company, 2011)Google Scholar
Savage, Charlie, “Secret U.S. memo made legal case to kill a citizen,” New York Times, October 8, 2011.
Pedrozo, Raul A., “Use of unmanned systems to combat terrorism.” International Law Studies 87 (2011): 217–269.Google Scholar
Alston Report, Extrajudicial, Summary or Arbitrary Executions, Study on Targeted Killings: Rep. of the Special Rapporteur, para. 85, UN Doc. A/HRC/14/24/Add.6 (May 8, 2010).
Schmitt, Michael N., “Drone attacks under the jus ad bellum and jus in bello: Clearing the ‘fog of war,’Yearbook International Human Law 13 (2010): 311–326, p. 316.Google Scholar
Cassese, Antonio, “The international community’s ‘legal’ response to terrorism,” International and Comparative Law Quarterly 38 (1989): 589–608, p. 597.CrossRefGoogle Scholar
Chesney, Robert, “Who may be killed? Anwar al-Awlaki as a case study in the international regulation of lethal force,” Yearbook of International Humanitarian Law 13 (2010): 3–60.Google Scholar
Risen, James, and Johnston, David, “Threats and responses: Hunt for Al Qaeda; Bush has widened authority of CIA to kill terrorists,” New York Times, December 15, 2002
Risen, James, and Miller, Judith, “CIA kills a leader of Qaeda in Yemen,” International Herald Tribune, November 5, 2002
Hersh, Seymour, “Manhunt,” New Yorker, December 23 and 30, 2002, p. 66.
O’Connell, Mary Ellen, “Lawful self-defense to terrorism,” University of Pittsburgh Law Review 63 (2002): 889–908.Google Scholar
Deeks, Ashley S., “Unwilling or unable: Toward a normative framework for extra-territorial self-defense,” Virginia Journal of International Law 52 (2012): 484–550.Google Scholar
Corn, Geoffrey S., “Self-defense targeting: Conflict classification or willful blindness?International Law Studies 88 (2012): 57–92.Google Scholar
Corn, Geoffrey S., and Jenks, Chris, “Two sides of the combatant coin: Untangling direct participation in hostilities from belligerent states in non-international armed conflicts,” University of Pennsylvania Journal of International Law 33 (2011): 313–362.Google Scholar
Melzer, Nils, “Interpretive guidance on the notion of direct participation in hostilities under international humanitarian law,” International Review Red Cross 90 (2008): 991–1047, p. 1007.Google Scholar
Chesney, Robert M., “Military-intelligence convergence and the law of the Title 10/Title 50 debate,” Journal of National Security Law and Policy 5 (2012): 539–629.Google Scholar
Alston, Philip, “The CIA and targeted killing beyond borders,” Harvard National Security Law Journal 2 (2011): 283–446.Google Scholar
Kasinof, Laura, Mazzetti, Mark, and Cowell, Alan, “U.S.-born Qaeda leader killed in Yemen,” New York Times, September 30, 2011.
Cronin, Audrey Kurth, “Why drones fail: When tactics drive strategy,” Foreign Affairs, July/August 2013, p. 44.
Sanger, David E., “America’s deadly dynamics with Iran,” New York Times, November 6, 2011.
Shane, Scott, “Coming soon: The drones arms race,” New York Times, October 8, 2011.

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×