‘Eye In The Sky’: The Reality Of Drone Warfare Revealed

Col. Katherine Powell, a military officer in command of an operation to capture terrorists in Kenya, sees her mission escalate when a girl enters the kill zone triggering an international dispute over the implications of modern warfare.

Gavin Hood’s new film ‘Eye in the Sky’ is a thrillingly intelligent exploration of the political and ethical questions surrounding drone warfare.

It has been carefully researched and is on the cutting edge of what is currently possible. But there’s a longer history and a wider geography that casts those issues in a different light.

As soon as the Wright brothers demonstrated the possibility of human flight, others were busy imagining flying machines with nobody on board. In 1910 the engineer Raymond Phillips captivated crowds in the London Hippodrome with a remotely controlled airship that floated out over the stalls and, when he pressed a switch, released hundreds of paper birds on to the heads of the audience below. When he built the real thing, he promised, the birds would be replaced with bombs. Sitting safely in London he could attack Paris or Berlin.

There has always been something hideously theatrical about bombing – recall the shock and awe visited on the inhabitants of Baghdad in 2003. The spectacle now includes the marionette movements of drones, Predators and Reapers whose electronic strings are pulled from thousands of miles away.

Remoteness, however, is an elastic measure. Human beings have been killing others at ever-greater distances since the invention of the dart, the spear and the slingshot. The invention of firearms wrought another transformation in the range of military violence. And yet today, in a world shrunk by the very technologies that have made the deployment of armed drones possible, the use of these remote platforms seems to turn distance back into a moral absolute.

But if it is wrong to kill someone from 7,500 miles away (the distance from Creech air force base in Nevada to Afghanistan), over what distance is it permissible to kill somebody? For some, the difference is that drone crews are safe in the continental United States, their lives are not on the line, and this has become a constant refrain in the drone debates.

In fact, the US Air Force has been concerned about the safety of its aircrews ever since its high losses during the Second World War. After Hiroshima and Nagasaki, it experimented with remotely controlled B-17 and B-47 aircraft to drop nuclear bombs without exposing aircrews to danger from the blast, and today it lauds its Predators and Reapers for their ability to “project power without vulnerability”.

It’s a complicated boast, because these remote platforms are slow, sluggish and easy to shoot down. They can only be used in uncontested air space against people who can’t fight back. There are almost 200 people involved in every combat air patrol and most of them are indeed out of harm’s way. But in Afghanistan the launch and recovery and the maintenance crews, Predators and Reapers have a short range, so that they have to be launched by crews close to their targets, are exposed to real danger.

Bombing in the major wars of the 20th century was always dangerous to those who carried it out, but those who dropped bombs over Hamburg or Cologne in the Second World War or Vietnam in the 1960s and 1970s were, in a crucial sense, also remote from their targets. “The good thing about being in an aeroplane at war is that you never touch the enemy”, recalled one veteran of Bomber Command. “You never see the whites of their eyes.”

Distance no longer confers blindness on those who operate today’s drones. They have a much closer, more detailed view of the people they kill. The US Air Force describes their job as putting “warheads on foreheads”, and they are required to remain on station to carry out a battle damage assessment that is often an inventory of body parts.  Most drone crews will tell you that they do not feel thousands of miles away from the action: just 18 inches, the distance from eye to screen.

Their primary function is to provide intelligence, surveillance and reconnaissance. Although drones have been armed since 2001, until 2012 they were directly responsible for only 5 to 10% of air strikes in Afghanistan. But they were involved in orchestrating more.

Flying a Predator or a Reaper “is more like being a manager”, one pilot has explained. “You’re managing multiple assets and you’re involved with the other platforms using the information coming off of your aircraft.”

In principle it’s not so different from using aircraft to range targets for artillery on the Western Front, but the process has been radicalized by the drone’s real-time full-motion video feeds that enable highly mobile “targets of opportunity” to be identified and tracked. In the absence of ground intelligence, this becomes crucial: until drones were relocated in sufficient numbers from Afghanistan and elsewhere to enable purported IS-targets in Syria to be identified, most US aircraft were returning to base without releasing their weapons.

Armed drones are used to carry out targeted killings, both inside and outside areas of “active hostilities”, and to provide close air support to ground troops. Targeted killing has spurred an intense critical debate, and rightly so, this is the focus of Eye in the Sky too, but close air support has not been subject to the same scrutiny. In both cases, video feeds are central, but it is a mistake to think that this reduces war to a video game – a jibe that in any case fails to appreciate that today’s video games are often profoundly immersive.

In fact, that may be part of the problem. Several studies have shown that civilian casualties are most likely when air strikes are carried out to support troops in contact with an enemy, and even more likely when they are carried out from remote platforms. I suspect that drone crews may compensate for their physical rather than emotional distance by “leaning forward” to do everything they can to protect the troops on the ground.

This in turn predisposes them to interpret every action in the vicinity of a ground force as hostile – and civilians as combatants – not least because these are silent movies: the only sound, apart from the clacking of computer keys as they talk in secure chat-rooms with those watching the video feeds, comes from radio communications with their own forces.

In contrast to those shown in Eye in the Sky, those feeds are often blurry, fuzzy, indistinct, broken, compressed – and, above all, ambiguous. How can you be sure that is an insurgent burying an IED and not a farmer digging a ditch? The situation is more fraught because the image stream is watched by so many other eyes on the ground, who all have their own ideas about what is being shown and what to do about it.

Combining sensor and shooter in the same (remote) platform may have “compressed the kill-chain”, as the air force puts it, and this is vital in an era of “just in time”, liquid war where everything happens so fast.

Yet in another sense the kill-chain has been spectacularly extended: senior officers, ground force commanders, military lawyers and video analysts all have access to the feeds. There’s a wonderful passage in Brian Castner’s book All the Ways we Kill and Die that captures the dilemma perfectly.

“A human in the loop?” Castner’s drone pilot complains. “Try two or three or 100 humans in the loop. Gene was the eye of the needle, and the whole war and a thousand rich generals must pass through him ... If they wanted to fly the fucking plane, they could come out and do it themselves.”

This is the networked warfare, scattered over multiple locations around the world, shown in Eye in the Sky. But the network often goes down and gets overloaded, it’s not a smooth and seamlessly functioning machine, and it is shot through with ambiguity, uncertainty and indecision.

And often those eyes in the sky multiply, rather than disperse, the fogs of war.

Guardian

« Cyber Threat Intelligence: Sharing Is Caring
The Growing Cyber Threat From Iran »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

National Digital Exploitation Centre (NDEC) - United Kingdom

National Digital Exploitation Centre (NDEC) - United Kingdom

NDEC is a project to create a centre of cyber and digital development and education for the UK. It will offer training in digital practices, cyber security and research.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Finnish Accreditation Service (FINAS)

Finnish Accreditation Service (FINAS)

FINAS is the national accreditation body for Finland. The directory of members provides details of organisations offering certification services for ISO 27001.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

Centre for Multidisciplinary Research, Innovation & Collaboration (C-MRiC)

C-MRiC collaborates on initiatives, ranging from national cyber security, enterprise security, information assurance, protection strategy, climate control to health and life sciences.

HB-Technologies

HB-Technologies

HB-Technologies is pioneer in Africa, in digital security, embedded electronic and IT solutions based on highly secure smart cards that comply with international standards and norms.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

Conosco

Conosco

Conosco are industry-leading experts throughout the UK in strategic consulting, project delivery, business communications, support, and security.

Lansafe

Lansafe

Lansafe stands as a leading managed service provider in the UK, seamlessly integrating IT, Telecoms, Security, Electrical and Cyber Security solutions.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.

Cythera

Cythera

Cythera is an Australian cyber security company with in-house cyber security professionals providing world-class cyber protection to medium to large companies all over Australia.

Academia the Technology Group

Academia the Technology Group

Academia specialise in the supply of software, IT hardware, training and service solutions to the public sectors, business and pro media markets.